Difference between revisions of "Team:UNOTT/Description"

 
(136 intermediate revisions by 3 users not shown)
Line 4: Line 4:
  
 
<head>
 
<head>
 +
<meta name="viewport" content="width=device-width, initial-scale=1">
 +
<meta charset="UTF-8">
 
<link href="https://fonts.googleapis.com/css?family=Karla" rel="stylesheet">
 
<link href="https://fonts.googleapis.com/css?family=Karla" rel="stylesheet">
 +
 
<style>
 
<style>
body {
+
      @import url(https://fonts.googleapis.com/css?family=Lato:300,400,300italic,400italic);
 +
 
 +
      /* Base Styles
 +
      ===================================*/
 +
      body {
 +
     
 +
      font-family: 'Lato', sans-serif;
 +
      font-weight: 400;
 +
      line-height: 1.8;
 +
        background-color: #fff;
 +
        width: auto;
 +
        position:absolute;
 +
 
 +
      }
 +
 
 +
 
 +
      /* Layout Styles
 +
      ===================================*/
 +
      section:not(:first-of-type),
 +
      section:not(:nth-of-type(n2)) {
 +
      margin-top: 80px;
 +
      }
 +
      .section-two,
 +
      .section-three,
 +
      footer {
 +
      margin-top: 80px;
 +
      }
 +
 
 +
 
 +
     
 +
 
 +
      /* Cover / Jumbotron Styles
 +
      ===================================*/
 +
      section .cover {
 +
      padding-top: 70px;
 +
     
 +
      background-repeat: no-repeat;
 +
      background-size: cover;
 +
      height: 100vh;
 +
        width: 100vw;
 +
     
 +
      display: -ms-flexbox;
 +
      display: flex;
 +
       
 +
      }
 +
 
 +
 
 +
      /* Section One Styles
 +
      ===================================*/
 +
      .section-one-content {
 +
      padding: 40px 20px;
 +
      color: #ffffff;
 +
      font-weight: 300;
 +
      }
 +
      .section-one-content h1 {
 +
      margin: 0 0 20px;
 +
      }
 +
      #section-one-left {
 +
      background: #183532;
 +
      }
 +
      #section-one-middle {
 +
      background: #244F4A;
 +
      }
 +
      #section-one-right {
 +
      background: #2A5C56;
 +
      }
 +
 
 +
      .section-two,
 +
      .section-three {
 +
        margin: auto;
 +
    width: 60%;
 +
    padding: 10px;
 
     font-family: 'Karla', sans-serif;
 
     font-family: 'Karla', sans-serif;
 +
    background-color: #ffffff;
 +
     
 +
      }
 +
 +
      /* CSS Image Styles
 +
      ====================================================*/
 +
      .css-img-wrapper {
 +
          display: -webkit-box;
 +
          display: -ms-flexbox;
 +
          display: flex;
 +
          -webkit-box-orient: vertical;
 +
          -webkit-box-direction: normal;
 +
              -ms-flex-direction: column;
 +
                  flex-direction: column;
 +
          -ms-flex-wrap: nowrap;
 +
              flex-wrap: nowrap;
 +
          -webkit-box-pack: center;
 +
              -ms-flex-pack: center;
 +
                  justify-content: center;
 +
          -ms-flex-line-pack: center;
 +
              align-content: center;
 +
          -webkit-box-align: center;
 +
              -ms-flex-align: center;
 +
                  align-items: center;
 +
      }
 +
      .img-designers,
 +
      .img-developers {
 +
      height: 400px;
 +
      width: 400px;
 +
      background-position: center center;
 +
      background-size: cover;
 +
      }
 +
      .img-designers {
 +
      background: #183532;
 +
      }
 +
      .img-developers {
 +
      background: #2A5C56;
 +
      }
 +
 +
 +
 +
      /* Media Styles
 +
      ===================================*/
 +
      @media (min-width: 480px) {
 +
      body {
 +
      font-size: 16px;
 +
             
 +
               
 +
      }
 +
      }
 +
      @media (min-width: 768px) {
 +
      .section-one-content {
 +
      padding: 40px 40px;
 +
      }
 +
      }
 +
      @media (min-width: 992px) {
 +
      .section-one-content {
 +
      padding: 40px 20px;
 +
      }
 +
      }
 +
      @media (min-width: 1200px) {
 +
      .section-one-content {
 +
      padding: 40px 40px;
 +
      }
 +
      }
 +
 +
@media only screen and (max-width: 500px) {
 +
    .section.cover {
 +
        max-width:100%;
 +
    }
 +
 +
    .cover {
 +
        max-width:100%;
 +
    }
 +
 +
 
}
 
}
  
.leftcol {
+
   
width: 40%;
+
.maintext {
float: left;
+
position: absolute;
position: relative;
+
left: 33%%;
min-height: 1px;
+
top: 10%;
right: -100px;
+
padding-left: 15px;
+
+
 
}
 
}
  
.rightcol {
+
.maintext2 {
width: 40%;
+
position: absolute;
float: right;
+
left: 33%;
 +
top: 40%;
 +
}
 +
 
 +
.mainimage{
 +
max-width: 100%;
 +
height: auto;
 +
}
 +
 
 +
.contentmargin {
 +
    margin: auto;
 +
    width: 60%;
 +
    padding: 10px;
 +
    font-family: 'Karla', sans-serif;
 +
    background-color: #ffffff;
 +
}
 +
 
 +
h1 {
 +
  font-weight: normal;
 +
  letter-spacing: -1px;
 +
  color: #34495E;
 +
}
 +
h2 {
 +
  font-weight: normal;
 +
  letter-spacing: -1px;
 +
  color: #34495E;
 +
}
 +
p {
 +
  font-weight: normal;
 +
  letter-spacing: -1px;
 +
  color: #4b524a;
 +
 
 +
.ourkey {
 
  position: relative;
 
  position: relative;
  top: 200px;
+
  top:15px;
min-height: 1px;
+
right: 100px;
+
padding-left: 15px;
+
padding-bottom:500px;
+
 
}
 
}
 +
h5 {
 +
  font-weight: normal;
 +
  letter-spacing: -1px;
 +
  color: #4b524a;
 
</style>
 
</style>
 
</head>
 
</head>
Line 35: Line 214:
 
<body>
 
<body>
 
<div id="container" style=" background-color: #02263E;">
 
<div id="container" style=" background-color: #02263E;">
 +
<p><span style="color: #ffffff;">&nbsp;</span></p>
 
<p><span style="color: #ffffff;">&nbsp;</span></p>
 
<p><span style="color: #ffffff;">&nbsp;</span></p>
 
<p><span style="color: #ffffff;">&nbsp;</span></p>
 
<p><span style="color: #ffffff;">&nbsp;</span></p>
Line 41: Line 221:
 
</div>
 
</div>
  
 +
<br>
 +
<br>
 +
<br>
 +
<!-- Section Two; -->
 +
<section class="container section-two" id="spydesingers">
 +
<div class="row">
 +
<div class="col-md-6 to-match">
 +
<h1>What?</h1>
 +
<article>
 +
<p><b><i>Key. coli</i> provides a new, more secure, form of key for accessing content.</b> It uses random ligations and large repertoires of possible components to generate unique combinations of expression profiles; this next generation biological key could be the next BIG thing in security; watch this space!
  
<h3 style="text-align: center;"><span style="color: #D74214;"><strong><em>KEY. COLI </em>- PROTECT YOUR GEMS WITH GERMS!</strong></span></h3>
+
</p>
<p style="text-align: center;"><span style="color: #ffffff;">________________</span></p>
+
                 
<p>
+
<p>
+
<div class="leftcol";>
+
</article>
<h3 style="text-align: center; color: #339966;"><strong>Why do we need <em>Key.&nbsp;coli?<strong></em></h3>
+
</div>
<p><span style="color: #ffffff;">&nbsp;</span></p>
+
<p>Security, and keys of every type are doomed. Physical keys can be photographed from a distance and 3D printed ; high zoom cameras mean its possible for someone to take a photo of keys left on the side then design a 3D print from this and use that print to open your door. Digital keys can be hacked, and with the advent of quantum computers prime numbers involved in encryption will be void. The currently popular biometrics such as fingerprints and retina scanners can also be hacked with a piece of paper and a photo. This means that almost anywhere someone wanted to get in to, could be brute forced. (ie, they don’t need humans to make a mistake to get through, computational power can hack through doors).
+
<img class="ourkey" src="https://static.igem.org/mediawiki/2017/3/36/T--UNOTT--keyk.png" style="width:40%;height:auto;">
  
<p>In order to create a key it must be 1. Unique, 2. Measurable, 3. Unpredictable, eg: A door key is unique enough that it will only open your house, the door lock measures the key dimensions via pins, and the choice of unique key is random, therefore to some extent the door lock is unpredictable to an invader. A fourth factor is the speed of key production, if the key is to be sold.
+
  
<p>The University of Nottingham iGEM team (iGEM being a competition of synthetic biology devices) have created a new kind of key based on fluorescence in bacteria. The team have taken three Jellyfish fluorescent proteins, each corresponding to a colour. Red, green and blue are the primary colours and are also the coloured proteins chosen by the team, therefore a combination of any of these colours (depending on intensity/expression of each) can create any visible colour, much like on a “Photoshop” colour slider. Unlike normal colour however, these fluorescent proteins cannot be seen to their full potential with the naked eye.
+
 +
</section>
 +
<!--//Close Section Two -->
 +
 +
 +
 +
<div class="contentmargin">
 +
<h1>Why?</h1>
 +
 +
 +
<p><b>Major hacking incidents are increasingly common,</b> with accounts being hacked and sensitive information stolen. Many companies are moving away from conventional passwords, which are proving to be unreliable in the hands of the public. Banks are now using physical biometric authentication procedures to correctly identify account owners. This new direction opens a market for biological “passwords”. An ideal system would be as separate from online software programs as possible while maintaining the complexity and uniqueness of a biometric system. Cells are effectively living computers, so we can programme cells to act as a changeable biometric password. </p>
 +
  
  
<p>Jellyfish live under a giant blue filter. Water has a small tint of blue, and the deeper down you go, the more all colours are filtered, apart from blue. This creates an almost black and white abyss in the ocean where the jellyfish live. If I was to wear a red jacket in the deep ocean, it would look like a blue jacket. Jellyfish have many defences and want creatures around to know where they are. They have proteins that absorb the blue light all around, and emit a green light. The green light brings back colour to the otherwise monocolour world. This makes the jellyfish more obvious, saying “Hey I’m a jellyfish. I’m clearly here and green, get lost”. The iGEM team have taken this protein, with modifications by Tsien et al (receiver of a Chemistry Nobel Prize, 2008) and inserted it into bacteria in a modular, factory like way.
 
  
<p>The colours of the jellyfish proteins can only be unlocked when the correct wavelengths of light are shone upon them. This means if a bacterial colony was photographed it couldn’t show the range of colours it truly has, as each protein has a spectrum of emission and absorption not visible in white light. In addition, the methods for decision of each colour chosen are decided by a ligation process which is driven by Brownian motion. Brownian motion involves quantum mechanics to orient particle movement, therefore the ligation decisions use a truly random process, that cannot be predicted.
 
  
<p>Modular ligation process uses library of P/T parts, giving each protein a different expression randomly.
 
The uniqueness of the key is therefore decided by the array of colours that extend beyond the visible spectrum, the combination of these creates over 11,000 combinations using just the three colours currently being used. In the future it is hoped that with the hundreds of fluorescent proteins that exist, over a google (10^100) combinations can be created. The unpredictability of the key is ensured by quantum biological processes. The mass production element of key design is done via modularity in the ligation and transformation process.
 
  
<p>Bacteria are delicate, therefore the team freeze dries the keys they create, similar to how some astronaut food is stored. This lets the keys last extremely long periods of time, even at room temperature. The frozen bacteria will be kept in a key sized device, then can be measured whenever necessary.
+
<h1>How?</h1>
  
<p>Measurement of the bacterial key is undertaken by an array of lasers that excite the jellyfish proteins to reveal their full spectra. An image recognition software designed by one of the Nottingham researchers then compares this spectrum with that of a correct spectrum, or of another freeze dried colony. Only correct spectrum ratios that the programme accepts are allowed access. The laser measurement device can be as small as a conventional door locks used today. Currently a “Raspberry pi” device is being used as a prototype to house all this programming.
+
<p><b>A key must be unique, measurable and unpredictable.</b> In <i>Key. coli</i>, all these requirements are achieved by the random generation of modular vectors that are expressed in Escherichia coli to produce a unique and detectable fluorescent pattern. This pattern is obtained when different fluorescent proteins (GFP, RFP, CFP) and various promoters, subjected to transcription interference by dCas9, are randomly combined during ligation and transformed into the cells to generate the key. </p>
 +
<p><span style="color: #ffffff;">&nbsp;</span></p>
 +
<p><span style="color: #ffffff;">&nbsp;</span></p>
  
<p>There are two forms of key currently possible, one requires re-activation of the bacteria (which is a slow method) and another requires only a vial of freeze dried bacteria. If the re-activation method is chosen, bacteria typically take at least 20 minutes to revive. The re-activation method can be used at banks, thereby limiting how fast would-be bank robbers could steal money. The police would be there before any money could be taken. The fast method would be a slightly less secure version for personal use, and would be used similar to current keys, simply putting the device in the measurement groove to gain access.
+
<img src="https://static.igem.org/mediawiki/2017/8/84/UNOTT2017-How1.png" alt="" width="100%" height="100%">
 +
<h5><b> Figure 1:</b> Two-plasmid modular process used to generate random<i>Key. coli</i> construct(s)<p>
 +
<p><span style="color: #ffffff;">&nbsp;</span></p>
 +
<p><span style="color: #ffffff;">&nbsp;</span></p><p><span style="color: #ffffff;">&nbsp;</span></p>
 +
<p><span style="color: #ffffff;">&nbsp;</span></p>
 +
<img src="https://static.igem.org/mediawiki/2017/b/bc/UNOTT2017-How2.png" alt="" width="100%" height="100%"></h5>
  
<p>The advantage of the key iGEM Nottingham have created is its non-digital, unhackable design. Even with the current 11,000 combinations, it would take years of research for another lab to produce all 11,000 combinations and test them on a door; brute forcing would no longer be an issue. If a google of combinations are used, access would take the lifetime of the universe. It is hoped that when more proteins are used, the key could even be used as a form of ID, databanks holding freeze-dried bacteria would be used as verification on the other side. These databases would be unable to be hacked, especially on large scales such as the 143 million citizens hacked in the US last year, as access would be individually based.
+
<h5><b>Figure 2:</b> Random ligation process and colony picking allows large numbers of plasmid variants to be created for use in keys. </p> <p><span style="color: #ffffff;">&nbsp;</span></p></h5>
 +
<p><span style="color: #ffffff;">&nbsp;</span></p>
 +
<br>
 +
<p>A key transport device, based on freeze-dried <i>Key. coli</i>, allows the bacteria to survive and be transported anywhere with ease. Once entry to a lock is desired, the <i>Key. coli</i> device can be activated, and the output read in a suitable detection device. </p>
  
<p>Bacteria, or other biological keys could be the future of security, they might be necessary with quantum technology able to break our passwords coming to the commercial market very soon. However it will likely be years before such keys are available for private use.
+
<h1><i>Key. coli</i> Summary</h1>
 
+
 
+
<p style="text-align: center;"><img src="https://static.igem.org/mediawiki/2017/8/89/UNOTT2017-propagandascript.png" alt="" width="408" height="262" />&nbsp;</p>
+
<p><img src="https://static.igem.org/mediawiki/2017/8/83/UNOTT2017-summary.png" alt="" width="100%" height="auto" /></p>
 
+
<br>
<p>However With the tools available in synthetic biology, there’s significant opportunity to provide secure, synthetically generated biometric's. To create a key a unique signature must be able to be created efficiently and randomly for a device or object to scan to ensure it is the correct key. Consequently, our team developed a randomly assorting fluorescent bacterial key, which uses fluorescence as a measurement of its uniqueness. Three fluorescent proteins are expressed using different promoters to create a quantified spectrum of colour.
+
<br>
</p>
+
<br>
 +
<br>
 +
  
 
</div>
 
</div>
<div class="rightcol";>
+
</body>
 
+
<h3 style="text-align: center; color: #339966;"><strong>How is this Achieved?</strong></em></h3>
+
<p>Our project aim is to provide a platform for multiple proteins to be expressed simultaneously at different levels. dCas9 will be targeted to repress a given promoter preceding a protein by using a short guide RNA (sgRNA) corresponding to this promoter. Our initial proof of concept system uses fluorescent proteins as the reporter signal and we have taken five promoter-sgRNA pairings from literature and constructed two plasmids which will give many different combinations of protein levels. One plasmid contains three promoters (although this will be expandable) joined up to three different fluorescent proteins. This plasmid will also express dCas9, which we will submit to the iGEM registry. The second plasmid will express 3 different sgRNAs which target each one of these promoters and, by having the option of a non-targeting sgRNA too, we have ON/OFF switches for these fluorescent proteins. In the future, we can expand this to different levels, rather than just two, by creating mismatches in the sgRNA seed region, which has been shown to reduce efficiency of repression by dCas9. Discernible combinations would only be limited by the reproducibility of signals and accuracy of the measurement.</p>
+
 
+
<p style="text-align: center;"><img src="https://static.igem.org/mediawiki/2017/5/56/UNOTT2017-plasmiddescript.png" alt="" width="341" height="189" />&nbsp;</p>
+
 
+
<p>For future expansion, although there is a vast repertoire of fluorescent proteins, any other protein could also be substituted in and measured using other methods. In this way, this system could be used for a vast range of applications, from optimising production of proteins or a metabolic pathway to being used as a biological password. As our assembly method is all interchangeable so any protein can be linked to any promoter, and placed in any position in the plasmid.
+
We have chosen to focus our project on using this random assortment to create a natural random number generator, with application as a biological key as we felt this is the most exciting to the public and shows the design’s mechanism the best. We envisage a system where these plasmids can be assembled randomly (as this is how we designed our system) to produce an enormous number of combinations, which is a valuable characteristic in security. The potential impact from this application is that we will be providing a new, more secure, form of key for accessing content.
+
This is a hot topic at present; numerous major hacking incidents fixate online security at the forefront of many business’s concerns, as accounts are being hacked and sensitive information stolen. Many large companies are deviating away from conventional online character passwords, which are proving to be unreliable in the hands of the public. For instance, many banks are now developing physical biometric authentication procedures to correctly identify the true owner of an account. This new direction opens a market for biological “passwords”. An ideal system would be as decoupled from online software programs as possible, while maintaining the complexity and uniqueness of a biometric system. Cells are effectively living computers so we can programme cells to act as a changeable biometric password. Our product would have no human influence over the outcome of combinations due to our design, making it less prone to issues commonly associated with human carelessness such as using simple, easy to guess passwords.
+
This system combines aspects comparable to the traditional mechanical key, a digital key, and biometric keys - a fourth alternative to the paradigm. Also, this track of research will hopefully be of interest to many and stimulate further research into developing tools for advanced biological computation. The parallels between computation and genetic regulation are astounding, unlocking the potential for fully realised programmable genetic systems would be invaluable to society in numerous ways.
+
 
+
For the physical product, we plan on freeze-drying our “programmed” bacteria for storage in a device. We will optimise the conditions for this to optimise reproducibility and allow accurate authentication. The two signals need to have as low a variance as possible, otherwise the accuracy and completeness of emission signals is invalidated and fewer discernible combinations are possible. Therefore, we are using the data collected to form models to predict the outcomes of fluorescence under all possible conditions, and allow each key to be categorised separately by their output.
+
</p>
+
<p style="text-align: center;"><img src="https://static.igem.org/mediawiki/2017/6/67/UNOTT2017-jkeydesign.png" alt="" width="431" height="213" />&nbsp;</p>
+
 
+
</div>
+
 
+
 
</html>
 
</html>
 
{{:Team:UNOTT/Template/Footer}}
 
{{:Team:UNOTT/Template/Footer}}

Latest revision as of 03:45, 2 November 2017

 

 

 

PROJECT DESCRIPTION

 




What?

Key. coli provides a new, more secure, form of key for accessing content. It uses random ligations and large repertoires of possible components to generate unique combinations of expression profiles; this next generation biological key could be the next BIG thing in security; watch this space!

Why?

Major hacking incidents are increasingly common, with accounts being hacked and sensitive information stolen. Many companies are moving away from conventional passwords, which are proving to be unreliable in the hands of the public. Banks are now using physical biometric authentication procedures to correctly identify account owners. This new direction opens a market for biological “passwords”. An ideal system would be as separate from online software programs as possible while maintaining the complexity and uniqueness of a biometric system. Cells are effectively living computers, so we can programme cells to act as a changeable biometric password.

How?

A key must be unique, measurable and unpredictable. In Key. coli, all these requirements are achieved by the random generation of modular vectors that are expressed in Escherichia coli to produce a unique and detectable fluorescent pattern. This pattern is obtained when different fluorescent proteins (GFP, RFP, CFP) and various promoters, subjected to transcription interference by dCas9, are randomly combined during ligation and transformed into the cells to generate the key.

 

 

Figure 1: Two-plasmid modular process used to generate randomKey. coli construct(s)

 

 

 

 

Figure 2: Random ligation process and colony picking allows large numbers of plasmid variants to be created for use in keys.

 

 


A key transport device, based on freeze-dried Key. coli, allows the bacteria to survive and be transported anywhere with ease. Once entry to a lock is desired, the Key. coli device can be activated, and the output read in a suitable detection device.

Key. coli Summary