Difference between revisions of "Team:UNOTT/Description"

 
(30 intermediate revisions by 2 users not shown)
Line 4: Line 4:
  
 
<head>
 
<head>
 +
<meta name="viewport" content="width=device-width, initial-scale=1">
 
<meta charset="UTF-8">
 
<meta charset="UTF-8">
 
<link href="https://fonts.googleapis.com/css?family=Karla" rel="stylesheet">
 
<link href="https://fonts.googleapis.com/css?family=Karla" rel="stylesheet">
Line 202: Line 203:
 
.ourkey {
 
.ourkey {
 
  position: relative;
 
  position: relative;
  top:50px;
+
  top:15px;
 
}
 
}
 +
h5 {
 +
  font-weight: normal;
 +
  letter-spacing: -1px;
 +
  color: #4b524a;
 
</style>
 
</style>
 
</head>
 
</head>
Line 234: Line 239:
 
</div>
 
</div>
 
 
<img class="ourkey" src="https://static.igem.org/mediawiki/2017/3/36/T--UNOTT--keyk.png" style="width:40%;height:auto;">
+
<img class="ourkey" src="https://static.igem.org/mediawiki/2017/3/36/T--UNOTT--keyk.png" style="width:40%;height:auto;">
 +
 
 +
 +
 
 
 
 
</section>
 
</section>
Line 255: Line 263:
  
 
<p><b>A key must be unique, measurable and unpredictable.</b> In <i>Key. coli</i>, all these requirements are achieved by the random generation of modular vectors that are expressed in Escherichia coli to produce a unique and detectable fluorescent pattern. This pattern is obtained when different fluorescent proteins (GFP, RFP, CFP) and various promoters, subjected to transcription interference by dCas9, are randomly combined during ligation and transformed into the cells to generate the key. </p>
 
<p><b>A key must be unique, measurable and unpredictable.</b> In <i>Key. coli</i>, all these requirements are achieved by the random generation of modular vectors that are expressed in Escherichia coli to produce a unique and detectable fluorescent pattern. This pattern is obtained when different fluorescent proteins (GFP, RFP, CFP) and various promoters, subjected to transcription interference by dCas9, are randomly combined during ligation and transformed into the cells to generate the key. </p>
 +
<p><span style="color: #ffffff;">&nbsp;</span></p>
 +
<p><span style="color: #ffffff;">&nbsp;</span></p>
 +
 +
<img src="https://static.igem.org/mediawiki/2017/8/84/UNOTT2017-How1.png" alt="" width="100%" height="100%">
 +
<h5><b> Figure 1:</b> Two-plasmid modular process used to generate random<i>Key. coli</i> construct(s)<p>
 +
<p><span style="color: #ffffff;">&nbsp;</span></p>
 +
<p><span style="color: #ffffff;">&nbsp;</span></p><p><span style="color: #ffffff;">&nbsp;</span></p>
 +
<p><span style="color: #ffffff;">&nbsp;</span></p>
 +
<img src="https://static.igem.org/mediawiki/2017/b/bc/UNOTT2017-How2.png" alt="" width="100%" height="100%"></h5>
  
<img src="https://static.igem.org/mediawiki/2017/6/62/UNOTT2017-How.png" alt="" width="100%" height="auto" />
+
<h5><b>Figure 2:</b> Random ligation process and colony picking allows large numbers of plasmid variants to be created for use in keys. </p> <p><span style="color: #ffffff;">&nbsp;</span></p></h5>
<p><b> Figure 1: Representation of <i>Key. coli</i> and the biological mechanisms the <i>Key. coli </i> system undergoes  due to the interaction of it's reporter and guideRNA plasmid expression.    </b></p>
+
<p><span style="color: #ffffff;">&nbsp;</span></p>
 
<br>
 
<br>
 
<p>A key transport device, based on freeze-dried <i>Key. coli</i>, allows the bacteria to survive and be transported anywhere with ease. Once entry to a lock is desired, the <i>Key. coli</i> device can be activated, and the output read in a suitable detection device. </p>
 
<p>A key transport device, based on freeze-dried <i>Key. coli</i>, allows the bacteria to survive and be transported anywhere with ease. Once entry to a lock is desired, the <i>Key. coli</i> device can be activated, and the output read in a suitable detection device. </p>
  
<h1>Summary</h1>
+
<h1><i>Key. coli</i> Summary</h1>
 
 
 
 

Latest revision as of 03:45, 2 November 2017

 

 

 

PROJECT DESCRIPTION

 




What?

Key. coli provides a new, more secure, form of key for accessing content. It uses random ligations and large repertoires of possible components to generate unique combinations of expression profiles; this next generation biological key could be the next BIG thing in security; watch this space!

Why?

Major hacking incidents are increasingly common, with accounts being hacked and sensitive information stolen. Many companies are moving away from conventional passwords, which are proving to be unreliable in the hands of the public. Banks are now using physical biometric authentication procedures to correctly identify account owners. This new direction opens a market for biological “passwords”. An ideal system would be as separate from online software programs as possible while maintaining the complexity and uniqueness of a biometric system. Cells are effectively living computers, so we can programme cells to act as a changeable biometric password.

How?

A key must be unique, measurable and unpredictable. In Key. coli, all these requirements are achieved by the random generation of modular vectors that are expressed in Escherichia coli to produce a unique and detectable fluorescent pattern. This pattern is obtained when different fluorescent proteins (GFP, RFP, CFP) and various promoters, subjected to transcription interference by dCas9, are randomly combined during ligation and transformed into the cells to generate the key.

 

 

Figure 1: Two-plasmid modular process used to generate randomKey. coli construct(s)

 

 

 

 

Figure 2: Random ligation process and colony picking allows large numbers of plasmid variants to be created for use in keys.

 

 


A key transport device, based on freeze-dried Key. coli, allows the bacteria to survive and be transported anywhere with ease. Once entry to a lock is desired, the Key. coli device can be activated, and the output read in a suitable detection device.

Key. coli Summary