Difference between revisions of "Team:UNOTT/Software"

Line 443: Line 443:
 
<p style="text-align: center;" > Figure 9 </p>  
 
<p style="text-align: center;" > Figure 9 </p>  
 
<p style="text-align: center;" > <img src="https://static.igem.org/mediawiki/2017/4/4a/T--UNOTT--rpi.jpeg" class="border" width="400" height="400" > </p>  
 
<p style="text-align: center;" > <img src="https://static.igem.org/mediawiki/2017/4/4a/T--UNOTT--rpi.jpeg" class="border" width="400" height="400" > </p>  
 +
 +
<br> </br>
  
 
<p> This was done to show people how Key.Coli could be used to secure your computer from strangers who don't have the Key.Coli but might know your password as well as giving us a physical demonstration of Key.Coli to show at the Jamboree.</p>
 
<p> This was done to show people how Key.Coli could be used to secure your computer from strangers who don't have the Key.Coli but might know your password as well as giving us a physical demonstration of Key.Coli to show at the Jamboree.</p>
 
<br> </br>
 
<br> </br>
<p> The system was designed as a program that would load when Linux booted up. The system works by locking out the user from files where they can only access the a temporary file where the spectra from the colonies would go.
+
<p> The system was designed as a program that would load when Linux booted up. The system works by locking out the user by shutting down all possible inputs other than an input from the reader. In order to "unlock" your computer, the user would need to connect the Raspberry Pi to two different fluorescent readers: one for the mother colony, and one for the Key.Coli mechanism.  
This is compared <sup> 1 </sup> and if it matches the threshold, the computer unfreezes.</p>  
+
The data sets from both colonies are compared <sup> 1 </sup> and if it matches the threshold, the computer unfreezes.</p>  
 
<br> </br>
 
<br> </br>
 
<p style="text-align: center;" >  The usage is shown on a video here: </p>  
 
<p style="text-align: center;" >  The usage is shown on a video here: </p>  
Line 455: Line 457:
 
</video> </p>
 
</video> </p>
  
<p> Using the Key.Coli Verification  software developed and modifying it to support the file system on the Pi, this successfully happened. In order to "unlock" your computer, the user would need to connect the Raspberry Pi to two different fluorescent readers: one for the mother colony, and one for the Key.Coli mechanism. Both readings would be stored in a temporary file space and compared for similarity. </p>  
+
<p> In the video, the Key.Coli software can be seen running. This secures the computer; as the user tries to move their mouse, it won't operate as all inputs have been blocked. A prompt on screen tells the user to plug in a fluorescence reader. Since we are not in lab, the user instead used a USB stick with the fluorescence data to represent the fluorescence reader. Later on, this will be patched so it can only take inputs from a reader. Once inputted, the data from the reader is compared with another data-set from the mother colony and the user is let through. In the video, you can see that as the user is able to move their mouse again. </p>
 +
<br> </br> 
 +
 
 +
<p> Using the Key.Coli Verification software developed and modifying it to support the file system on the Pi, this successfully happened. </p>  
 
<br> </br>
 
<br> </br>
 
<p> However, due to health and safety regulations, for the Jamboree, we read data from conditions in lab and stored them on USB sticks, acting as the Key.Coli and mother colony. This is similar to how the actual system would work, except it has USB drives instead of fluorescence readers </p>
 
<p> However, due to health and safety regulations, for the Jamboree, we read data from conditions in lab and stored them on USB sticks, acting as the Key.Coli and mother colony. This is similar to how the actual system would work, except it has USB drives instead of fluorescence readers </p>

Revision as of 03:49, 2 November 2017





SOFTWARE

Overview

About our software and why iGEM Nottingham chose to produce it

Image Comparison Software

Comparing images of spectra from two different colonies to check for similiarity

Key.Coli Verification

Comparing the raw data of two different colonies straight from the fluorescence reader

Fluorescence Spectra Simulation

Simulating fluorescence spectra from given protein concentrations

Random Number Generation

Generating random numbers from our randomly constructed colonies

Linux Key.Coli Security Layer

Porting our comparison software to low end hardware to safeguard a system