Difference between revisions of "Team:UNOTT/Description"

Line 201: Line 201:
 
.ourkey {
 
.ourkey {
 
  position: relative;
 
  position: relative;
  top:10px;
+
  top:;
 
}
 
}
 
</style>
 
</style>

Revision as of 21:52, 1 November 2017

 

 

 

PROJECT DESCRIPTION

 




What?

Key. coli provides a new, more secure, form of key for accessing content. It uses random ligations and large repertoires of possible components to generate unique combinations of expression profiles; this next generation biological key could be the next BIG thing in security; watch this space!

Why?

Major hacking incidents are increasingly common, with accounts being hacked and sensitive information stolen. Many companies are moving away from conventional passwords, which are proving to be unreliable in the hands of the public. Banks are now using physical biometric authentication procedures to correctly identify account owners. This new direction opens a market for biological “passwords”. An ideal system would be as separate from online software programs as possible while maintaining the complexity and uniqueness of a biometric system. Cells are effectively living computers, so we can programme cells to act as a changeable biometric password.

How?

A key must be unique, measurable and unpredictable. In Key. coli, all these requirements are achieved by the random generation of modular vectors that are expressed in Escherichia coli to produce a unique and detectable fluorescent pattern. This pattern is obtained when different fluorescent proteins (GFP, RFP, CFP) and various promoters, subjected to transcription interference by dcas9, are randomly combined during ligation and transformed into the cells to generate the key.

Figure 1: The biological mechanism the key. coli system undergoes due to the interaction of it's reporter and guideRNA plasmid expression.


A key transport device, based on freeze-dried Key. coli, allows the bacteria to survive and be transported anywhere with ease. Once entry to a lock is desired, the Key. Coli device can be activated, and the output read in a suitable detection device.