US20200193301A1 - Compositions and methods for nucleic acid-based data storage - Google Patents

Compositions and methods for nucleic acid-based data storage Download PDF

Info

Publication number
US20200193301A1
US20200193301A1 US16/414,758 US201916414758A US2020193301A1 US 20200193301 A1 US20200193301 A1 US 20200193301A1 US 201916414758 A US201916414758 A US 201916414758A US 2020193301 A1 US2020193301 A1 US 2020193301A1
Authority
US
United States
Prior art keywords
nucleic acid
identifier
acid molecules
identifiers
component
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
US16/414,758
Other languages
English (en)
Inventor
Nathaniel Roquet
HyunJun Park
Swapnil P. Bhatia
Devin Leake
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Catalog Technologies Inc
Original Assignee
Catalog Technologies Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Catalog Technologies Inc filed Critical Catalog Technologies Inc
Priority to US16/414,758 priority Critical patent/US20200193301A1/en
Assigned to Catalog Technologies, Inc. reassignment Catalog Technologies, Inc. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: BHATIA, SWAPNIL P., LEAKE, DEVIN, PARK, HYUNJUN, ROQUET, NATHANIEL
Publication of US20200193301A1 publication Critical patent/US20200193301A1/en
Priority to US17/206,803 priority patent/US11227219B2/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16BBIOINFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR GENETIC OR PROTEIN-RELATED DATA PROCESSING IN COMPUTATIONAL MOLECULAR BIOLOGY
    • G16B50/00ICT programming tools or database systems specially adapted for bioinformatics
    • G16B50/30Data warehousing; Computing architectures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/12Computing arrangements based on biological models using genetic models
    • G06N3/123DNA computing
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16BBIOINFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR GENETIC OR PROTEIN-RELATED DATA PROCESSING IN COMPUTATIONAL MOLECULAR BIOLOGY
    • G16B25/00ICT specially adapted for hybridisation; ICT specially adapted for gene or protein expression
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16BBIOINFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR GENETIC OR PROTEIN-RELATED DATA PROCESSING IN COMPUTATIONAL MOLECULAR BIOLOGY
    • G16B25/00ICT specially adapted for hybridisation; ICT specially adapted for gene or protein expression
    • G16B25/20Polymerase chain reaction [PCR]; Primer or probe design; Probe optimisation
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16BBIOINFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR GENETIC OR PROTEIN-RELATED DATA PROCESSING IN COMPUTATIONAL MOLECULAR BIOLOGY
    • G16B30/00ICT specially adapted for sequence analysis involving nucleotides or amino acids
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16BBIOINFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR GENETIC OR PROTEIN-RELATED DATA PROCESSING IN COMPUTATIONAL MOLECULAR BIOLOGY
    • G16B50/00ICT programming tools or database systems specially adapted for bioinformatics
    • G16B50/20Heterogeneous data integration
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16BBIOINFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR GENETIC OR PROTEIN-RELATED DATA PROCESSING IN COMPUTATIONAL MOLECULAR BIOLOGY
    • G16B99/00Subject matter not provided for in other groups of this subclass
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B82NANOTECHNOLOGY
    • B82YSPECIFIC USES OR APPLICATIONS OF NANOSTRUCTURES; MEASUREMENT OR ANALYSIS OF NANOSTRUCTURES; MANUFACTURE OR TREATMENT OF NANOSTRUCTURES
    • B82Y10/00Nanotechnology for information processing, storage or transmission, e.g. quantum computing or single electron logic
    • HELECTRICITY
    • H03ELECTRONIC CIRCUITRY
    • H03MCODING; DECODING; CODE CONVERSION IN GENERAL
    • H03M13/00Coding, decoding or code conversion, for error detection or error correction; Coding theory basic assumptions; Coding bounds; Error probability evaluation methods; Channel models; Simulation or testing of codes
    • H03M13/03Error detection or forward error correction by redundancy in data representation, i.e. code words containing more digits than the source words
    • H03M13/05Error detection or forward error correction by redundancy in data representation, i.e. code words containing more digits than the source words using block codes, i.e. a predetermined number of check bits joined to a predetermined number of information bits

Definitions

  • Nucleic acid digital data storage is a stable approach for encoding and storing information for long periods of time, with data stored at higher densities than magnetic tape or hard drive storage systems. Additionally, digital data stored in nucleic acid molecules that are stored in cold and dry conditions can be retrieved as long as 60,000 years later or longer.
  • nucleic acid molecules may be sequenced.
  • nucleic acid digital data storage may be an ideal method for storing data that is not frequently accessed but may have a high volume of information to be stored or archived for long periods of time.
  • component nucleic acid molecules e.g., components
  • identifier nucleic acid molecules e.g., identifiers
  • Those components may be organized in a structural manner, so as to provide an efficient scheme for representing digital data.
  • the structure of the components may cause the component molecules to self-assemble, or otherwise sort themselves in a predetermined order after the multiple component molecules are deposited or dispensed into the same compartment.
  • a population of identifier nucleic acid molecules share the same target molecule, while other identifier nucleic acid molecules in the same pool may have different target molecules.
  • At least one of the first and second end molecules of the at least one additional identifier nucleic acid molecule may be identical to a target molecule of the first identifier nucleic acid molecule in (b).
  • physically assembling the M selected component nucleic acid molecules comprises ligation of the component nucleic acid molecules.
  • the component nucleic acid molecules from each layer comprise at least one sticky end which is complementary to at least one sticky end of component nucleic acid molecules from another layer, so as to enable sticky end ligation for formation of the identifier nucleic acid molecules in (b) and (c).
  • all components within each layer e.g., A, B, C
  • the other sticky end of all components in layer B may be complementary to one sticky end of all components in layer C, and so on.
  • first molecule of the at least one additional identifier nucleic acid molecule in (c) is identical to the first end molecule of the identifier nucleic acid molecule in (b), and the second end molecule of the at least one additional identifier nucleic acid molecule in (c) is identical to the second end molecule of the identifier nucleic acid molecule in (b).
  • the method further comprises using the probe to hybridize to the target molecule of at least some identifier nucleic acid molecules in the first identifier nucleic acid molecule and the plurality of additional identifier nucleic acid molecules to select identifier nucleic acid molecules corresponding to respective symbols having contiguous symbol positions. Symbols with contiguous symbol positions are adjacent to one another and may share similar characteristics by virtue of being in a similar neighborhood. Accordingly, it may be desirable to select identifier nucleic acid molecules that are positioned near one another using the same probe.
  • the method further comprises applying a single PCR reaction to amplify at least two identifier nucleic acid molecules corresponding to respective symbols having contiguous symbol positions.
  • the at least two identifier nucleic acid molecules corresponding to respective symbols having contiguous symbol positions are able to be further amplified by another PCR reaction that targets a specific component nucleic acid molecule in the third molecule of the identifier nucleic acid molecule.
  • the component nucleic acid molecules in each layer are structured with first and second end regions, and the first end region of each component nucleic acid molecule from one of the M layers is structured to bind to the second end region of any component nucleic acid molecule from another of the M layers.
  • M is greater than or equal to three.
  • each symbol position within the string of symbols has a corresponding different identifier nucleic acid molecule.
  • the identifier nucleic acid molecules in (b) and (c) are representative of a subset of a combinatorial space of possible identifier nucleic acid molecules, each including one component nucleic acid molecule from each of the M layers.
  • the presence or absence of an identifier nucleic acid molecule in the pool in (d) is representative of the symbol value of the corresponding respective symbol position within the string of symbols.
  • the presence of an identifier may represent the symbol value at the corresponding symbol position is one, while the absence represents the symbol value is zero, or vice versa.
  • the symbols having contiguous symbol position encode similar digital information.
  • the distribution of numbers of component nucleic acid molecules in each of the M layers is non-uniform. For example, one layer may have more component nucleic acid molecules than another layer, so as to adjust the number and/or variety of possible permutations for creating identifier nucleic acid molecules.
  • a PCR query used to access the pool in (d) results in a larger pool of accessed identifier nucleic acid molecules than if the third layer included fewer component nucleic acid molecules than either of the first layer or the second layer.
  • a PCR query used to access the pool in (d) results in a smaller pool of accessed identifier nucleic acid molecules than if the third layer included more component nucleic acid molecules than either of the first layer or the second layer, wherein the smaller pool of accessed identifier nucleic acid molecules corresponds to a higher resolution of access to the symbols in the string of symbols.
  • the first layer has a highest priority
  • the second layer has a second highest priority
  • the remaining M ⁇ 2 layers have corresponding component nucleic acid molecules between the first and second end molecules.
  • the pool in (d) is able to be used to access all identifier nucleic acid molecules in the pool that have particular component nucleic acid molecules at the first and second end molecules, in one PCR reaction.
  • the present disclosure provides a method for storing digital information into nucleic acid molecules, the method comprising: (a) receiving the digital information as a string of symbols, wherein each symbol in the string of symbols has a symbol value and a symbol position within the string of symbols, wherein the digital information includes image data represented by a collection of vectors; (b) forming a first identifier nucleic acid molecule by: (1) selecting, from a set of distinct component nucleic acid molecules that are separated into M different layers, one component nucleic acid molecule from each of the M layers; (2) depositing the M selected component nucleic acid molecules into a compartment; and (3) physically assembling the M selected component nucleic acid molecules in (2) to form the first identifier nucleic acid molecule having first and second end molecules and a third molecule positioned between the first and second end molecules, such that the component nucleic acid molecules from first and second layers correspond to the first and second end molecules of the identifier nucleic acid molecule, and the component nucleic acid molecule in a
  • the method comprises step (a) above, (b) forming a first identifier nucleic acid molecule by depositing M selected component nucleic acid molecules into a compartment, the M selected component nucleic acid molecules being selected from a set of distinct component nucleic acid molecules that are separated into M different layers, and physically assembling the M selected component nucleic acid molecules; (c) forming a plurality of identifier nucleic acid molecules, each corresponding to a respective symbol position; and (d) collecting the identifier nucleic acid molecules in (b) and (c) in a pool having powder, liquid, or solid form.
  • the M layers correspond to different features of the image data.
  • the different features include an x-coordinate, a y-coordinate, and an intensity value or a range of intensity values.
  • Storing the image data into nucleic acid molecules may allow for any neighborhood of pixels to be queried for color values using a random access scheme, such as any of the access schemes described herein.
  • storing the image data into nucleic acid molecules allows for the image data to be decoded at a fraction of an original resolution of the image data.
  • the present disclosure provides a method for storing digital information into nucleic acid molecules, the method comprising: (a) receiving the digital information as a string of symbols, wherein each symbol in the string of symbols has a symbol value and a symbol position within the string of symbols, wherein the digital information includes image data represented by a collection of vectors; (b) forming a first identifier nucleic acid molecule by depositing M selected component nucleic acid molecules into a compartment, the M selected component nucleic acid molecules being selected from a set of distinct component nucleic acid molecules that are separated into M different layers; (c) forming a plurality of identifier nucleic acid molecules, each having first and second end molecules and a third molecule positioned between the first and second end molecules and corresponding to a respective symbol position, wherein at least one of the first end molecule, second end molecule, and third molecule of at least one additional identifier nucleic acid molecule is identical to a target molecule of the first identifier nucleic acid molecule in
  • storing the image data into nucleic acid molecules allows for the image data to be decoded at a fraction of an original resolution of the image data, and decoding the image data at the fraction is used to search for a specific visual feature in an archive of surveillance images or in a video archive to identify frames of interest.
  • the present disclosure provides a method for storing digital information into nucleic acid molecules, the method comprising: (a) receiving the digital information as a string of symbols, wherein each symbol in the string of symbols has a symbol value and a symbol position within the string of symbols; (b) forming a first identifier nucleic acid molecule by depositing M selected component nucleic acid molecules into a compartment, the M selected component nucleic acid molecules being selected from a set of distinct component nucleic acid molecules that are separated into M different layers, and physically assembling the M selected component nucleic acid molecules; (c) forming a plurality of identifier nucleic acid molecules, each having first and second end molecules and a third molecule positioned between the first and second end molecules and corresponding to a respective symbol position, wherein at least one of the first end molecule, second end molecule, and third molecule of at least one additional identifier nucleic acid molecule is identical to a target molecule of the first identifier nucleic acid molecule in (b),
  • Step (c) of the method for storing digital information may involve generally forming a plurality of identifier nucleic acid molecules, each corresponding to a respective symbol position, without performing the forming of the molecules having first and second end molecules and a third molecule, as recited above.
  • the present disclosure provides a method for storing digital information into nucleic acid molecules, the method comprising: (a) receiving the digital information as a string of symbols, wherein each symbol in the string of symbols has a symbol value and a symbol position within the string of symbols; (b) forming a first identifier nucleic acid molecule by depositing M selected component nucleic acid molecules into a compartment, the M selected component nucleic acid molecules being selected from a set of distinct component nucleic acid molecules that are separated into M different layers, and physically assembling the M selected component nucleic acid molecules using click chemistry; (c) forming a plurality of identifier nucleic acid molecules, each corresponding to a respective symbol position; (d) collecting the identifier nucleic acid molecules in (b) and (c) in a pool having powder, liquid, or solid form; and (e) deleting data collected in the pool.
  • step (c) comprises physically assembling a plurality of identifier nucleic acid molecules, each having first and second end molecules and a third molecule positioned between the first and second end molecules and corresponding to a respective symbol position, wherein at least one of the first end molecule, second end molecule, and third molecule of at least one additional identifier nucleic acid molecule is identical to a target molecule of the first identifier nucleic acid molecule in (b), so as to enable a single probe to select at least two identifier nucleic acid molecules corresponding to respective symbols having related symbol positions within the string of symbols, wherein physically assembling the M selected component nucleic acid molecules to form the identifier nucleic acid molecule in (b) comprises using click chemistry.
  • the method further comprises using sequence-specific probes to pull-down select identifier nucleic acid molecules from the pool in (d) to selectively delete data.
  • the select identifier nucleic acid molecules are selectively deleted using CRISPR-based methods.
  • the method further comprises obfuscating the identifier nucleic acid molecules in the pool in (d) to non-selectively delete data, by rendering it inaccessible, or difficult or impossible to read.
  • the method further comprises using sonication, autoclaving, treatment with bleach, bases, acids, ethidium bromide or other DNA modification agents, irradiation, combustion, and non-specific nuclease digestion to degrade the identifier nucleic acid molecules from the pool in (d) to non-selectively delete data.
  • the present disclosure provides a method for storing digital information into nucleic acid molecules, the method comprising: (a) receiving the digital information as a string of symbols, wherein each symbol in the string of symbols has a symbol value and a symbol position within the string of symbols; (b) dividing the string of symbols into one or more blocks of size no greater than a fixed length; (c) forming a first identifier nucleic acid molecule by depositing M selected component nucleic acid molecules into a compartment, the M selected component nucleic acid molecules being selected from a set of distinct component nucleic acid molecules that are separated into M different layers, and physically assembling the M selected component nucleic acid molecules; (d) forming a plurality of identifier nucleic acid molecules, each corresponding to a respective symbol position; and (e) collecting the identifier nucleic acid molecules in (d) and (c) in a pool having powder, liquid, or solid form.
  • the plurality of identifier nucleic acid molecules in step (d) above each has first and second end molecules and a third molecule positioned between the first and second end molecules and corresponding to a respective symbol position, wherein at least one of the first end molecule, second end molecule, and third molecule of at least one additional identifier nucleic acid molecule is identical to a target molecule of the first identifier nucleic acid molecule in (b), so as to enable a single probe to select at least two identifier nucleic acid molecules corresponding to respective symbols having related symbol positions within the string of symbols.
  • the method further comprises determining the size of each block based on the string of symbols, processing requirements, or an intended application of the digital information. In some implementations, the method further comprises computing a hash of each block. In some implementations, the method further comprises applying one or more error detection and correction to each block and computing one or more error protection bytes. In some implementations, the method further comprises mapping the one or more blocks to a set of codewords that optimizes chemical conditions during encoding or decoding. In some implementations, the set of codewords have a fixed weight such that a fixed number of identifier nucleic acid molecules are assembled in each reaction compartment in a writer system, and in approximately equal concentration within each reaction compartment and across reaction compartments.
  • the present disclosure provides a method performing a computation on digital information that has been stored into nucleic acid molecules. Importantly, that computation may be performed without having to read or decode the actual digital information from the pool of molecules.
  • the computation may include any combination of Boolean logic gates, such as an AND, OR, NOT, or NAND operation.
  • the present disclosure provides a method for storing digital information into nucleic acid molecules, the method comprising: (a) receiving the digital information as a string of symbols, wherein each symbol in the string of symbols has a symbol value and a symbol position within the string of symbols; (b) forming a first identifier nucleic acid molecule by depositing M selected component nucleic acid molecules into a compartment, the M selected component nucleic acid molecules being selected from a set of distinct component nucleic acid molecules that are separated into M different layers, and physically assembling the M selected component nucleic acid molecules; (c) forming a plurality of identifier nucleic acid molecules, each corresponding to a respective symbol position; (d) collecting the identifier nucleic acid molecules in (b) and (c) in a pool having powder, liquid, or solid form; and (e) performing a computation involving a Boolean logical operation, including AND, OR, NOT, or NAND, on the string of symbols using the identifier nucleic acid molecules in (
  • the identifier nucleic acid molecules in (c) above each has first and second end molecules and a third molecule positioned between the first and second end molecules and corresponding to a respective symbol position, wherein at least one of the first end molecule, second end molecule, and third molecule of at least one additional identifier nucleic acid molecule is identical to a target molecule of the first identifier nucleic acid molecule in (b), so as to enable a single probe to select at least two identifier nucleic acid molecules corresponding to respective symbols having related symbol positions within the string of symbols.
  • the computation is performed on the pool of identifier nucleic acid molecules in (d) without decoding any of the identifier nucleic acid molecules to obtain any of the symbols in the string of symbols.
  • performing the computation includes a series of chemical operations including hybridization and cleavage.
  • the string of symbols in (a) is denoted a and includes sub-bitstream s
  • the plurality of identifier nucleic acid molecules in the pool in (d) are double stranded and denoted dsA
  • the method further comprising obtaining another pool of another plurality of identifier nucleic acid molecules, denoted dsB and representative of another string of symbols denoted b including sub-bitstream t, wherein the computation is performed on a sub-bitstream s and t by performing a series of steps on dsA and dsB.
  • the series of steps on dsA and dsB includes performing an initialization step, comprising: converting the double stranded identifier nucleic acid molecules in dsA into positive single-stranded forms, denoted A; converting the double stranded identifier nucleic acid molecules in dsA into negative single-stranded forms, denoted A*, wherein A* is a reverse complement of A; converting the double stranded identifier nucleic acid molecules in dsB into positive single-stranded forms, denoted B; converting the double stranded identifier nucleic acid molecules in dcB into negative single-stranded forms, denoted B*, wherein B* is a reverse complement of B; selecting dsP as identifier nucleic acid molecules in dsA that correspond to s; selecting P as identifier nucleic acid molecules in A that correspond to s; selecting dsQ as identifier nucleic acid molecules in
  • the computation is an AND operation
  • the series of steps on dsA and dsB further comprises: performing the AND operation between a and b by combining A and B*, hybridizing complementary nucleic acid molecules, and selecting fully complemented double stranded nucleic acid molecules as the new pool of nucleic acid molecules.
  • the computation is an OR operation
  • the series of steps on dsA and dsB further comprises: performing the AND operation between s and t by combining P and Q*, hybridizing complementary nucleic acid molecules, and selecting fully complemented double stranded nucleic acid molecules as the new pool of nucleic acid molecules.
  • selecting the fully complemented nucleic acid molecules comprises using chromatography, gel electrophoresis, single-strand specific endonucleases, single-strand specific exonuclease, or a combination thereof.
  • the computation is an OR operation
  • the series of steps on dsA and dsB comprises performing the OR operation between a and b by combining dsA and dsB to produce the new pool of nucleic acid molecules.
  • the computation is an OR operation
  • the series of steps on dsA and dsB comprises performing the OR operation between s and t by combining dsP and dsQ to produce the new pool of nucleic acid molecules.
  • the method further comprises updating A or dsA to include the new pool of nucleic acid molecules, thereby allowing A or dsA to represent the output of the operation.
  • the present disclosure provides a method for storing digital information into nucleic acid molecules, the method comprising: (a) receiving the digital information as a string of symbols, wherein each symbol in the string of symbols has a symbol value and a symbol position within the string of symbols; (b) forming a first identifier nucleic acid molecule by depositing M selected component nucleic acid molecules into a compartment, the M selected component nucleic acid molecules being selected from a set of distinct component nucleic acid molecules that are separated into M different layers, and physically assembling the M selected component nucleic acid molecules; (c) forming a plurality of identifier nucleic acid molecules; and (c) partitioning the identifier nucleic acid molecules in (b) and (c) into separate bins, each bin corresponding to a different symbol value.
  • forming the first identifier nucleic acid molecule in (b) includes: (1) selecting, from a set of distinct component nucleic acid molecules that are separated into M different layers, one component nucleic acid molecule from each of the M layers; (2) depositing the M selected component nucleic acid molecules into a compartment; (3) physically assembling the M selected component nucleic acid molecules in (2) to form the first identifier nucleic acid molecule having first and second end molecules and a third molecule positioned between the first and second end molecules, such that the component nucleic acid molecules from first and second layers correspond to the first and second end molecules of the identifier nucleic acid molecule, and the component nucleic acid molecule in a third layer corresponds to the third molecule of the identifier nucleic acid molecule, to define a physical order of the M layers in the first identifier nucleic acid molecule.
  • the symbol position of each symbol having a particular symbol value is recorded in a bin reserved for that value, the bin being the compartment in (2).
  • the present disclosure provides a method for storing digital information into nucleic acid molecules, the method comprising: (a) receiving the digital information as a string of symbols, wherein each symbol in the string of symbols has a symbol value and a symbol position within the string of symbols; (b) forming a first identifier nucleic acid molecule by depositing M selected component nucleic acid molecules into a compartment, the M selected component nucleic acid molecules being selected from a set of distinct component nucleic acid molecules that are separated into M different layers, and physically assembling the M selected component nucleic acid molecules; (c) forming a plurality of identifier nucleic acid molecules; (c) forming a plurality of identifier nucleic acid molecules, each corresponding to a respective symbol position; and (d) collecting the identifier nucleic acid molecules in (b) and (c) in a pool having powder, liquid, or solid form.
  • step (c) above includes forming the plurality of identifier nucleic acid molecules, each having first and second end molecules and a third molecule positioned between the first and second end molecules and corresponding to a respective symbol position, wherein at least one of the first end molecule, second end molecule, and third molecule of at least one additional identifier nucleic acid molecule is identical to a target molecule of the first identifier nucleic acid molecule in (b), so as to enable a single probe to select at least two identifier nucleic acid molecules corresponding to respective symbols having related symbol positions within the string of symbols.
  • an individual component of the M selected components comprises multiple parts wherein each part comprises a nucleic acid molecule and wherein each part is linked to the same identifier by one or more chemical methods.
  • said multiple parts each serve separate functional purposes for different data storage operations.
  • said functional purposes include ease of sequencing and ease of access by nucleic acid hybridization.
  • forming the first identifier nucleic acid molecule comprises programmably mutating one or more bases in a parent identifier by applying base editors such as dCas9-deaminase.
  • the present disclosure provides a method for storing digital information into nucleic acid molecules, the method comprising: (a) receiving the digital information as a string of symbols, wherein each symbol in the string of symbols has a symbol value and a symbol position within the string of symbols; (b) forming a first identifier nucleic acid molecule by programmably mutating one or more bases in a parent identifier by applying base editors; (c) forming a plurality of identifier nucleic acid molecules, each identifier nucleic acid molecule corresponding to a respective symbol position; and (d) collecting the identifier nucleic acid molecules in (b) and (c) in a pool having powder, liquid, or solid form.
  • one of the base editors applied in (b) is dCas9-deaminase.
  • the present disclosure provides a method for storing digital information that is produced from one or more random processes, into nucleic acid molecules, the method comprising: (a) receiving the digital information as a string of symbols, wherein each symbol in the string of symbols has a symbol value and a symbol position within the string of symbols; (b) forming a first identifier nucleic acid molecule by depositing M selected component nucleic acid molecules into a compartment, the M selected component nucleic acid molecules being selected from a set of distinct component nucleic acid molecules that are separated into M different layers, and physically assembling the M selected component nucleic acid molecules; (c) forming a plurality of identifier nucleic acid molecules, each corresponding to a respective symbol position; and (d) collecting the identifier nucleic acid molecules in (b) and (c) in a pool having powder, liquid, or solid form.
  • the present disclosure provides an application of the above method, or any of the above methods, in which the application comprises encryption of information, authentication of entities, or its use as a source of entropy in applications involving randomization.
  • the application comprises encryption of information, authentication of entities, or its use as a source of entropy in applications involving randomization.
  • identifiers from one or more disjoint identifier libraries are used to uniquely identify entities or physical locations.
  • the present disclosure provides a method for encoding digital information in partitions of a number of random DNA species.
  • the present disclosure provides a method of generating random data by randomly sampling and sequencing DNA species from a large combinatorial pool of possible DNA species.
  • the present disclosure provides a method of generating and storing random data by randomly sampling and sequencing a subset of DNA species from a large combinatorial pool of possible DNA species.
  • said subset of DNA species is amplified to create multiple copies of each species.
  • nucleic acid molecules for error checking and correction are added to said subset of DNA species to enable robust future readout.
  • said subset of DNA species is barcoded with a unique molecule and combined in a pool of barcoded subsets of DNA species.
  • a particular subset of DNA species in said pool of barcoded subsets of DNA species is accessible with input nucleic acid probes for PCR or nucleic acid capture.
  • the present disclosure provides a method of securing and authenticating an artifact with a system comprising: (1) DNA keys made up of subsets of DNA species from a defined set, and (2) a DNA reader that accepts keys and either searches for a matching key to unlock said artifact locally or returns a hashed token to access the artifact elsewhere.
  • the method further comprises combinatorially assembling DNA fragments for biological applications.
  • the present disclosure provides a method for storing digital information into nucleic acid molecules, the method comprising: (a) receiving the digital information as a string of symbols, wherein each symbol in the string of symbols has a symbol value and a symbol position within the string of symbols; (b) forming a first identifier nucleic acid molecule by: (1) selecting, from a set of distinct component nucleic acid molecules that are separated into M different layers, one component nucleic acid molecule from each of the M layers; (2) depositing the M selected component nucleic acid molecules into a compartment; (3) physically assembling the M selected component nucleic acid molecules in (2) to form the first identifier nucleic acid molecule comprising a specified component, wherein the specified component comprises at least one target molecule, to allow access of the identifier containing the specified component; (c) physically assembling a plurality of additional identifier nucleic acid molecules, each having the specified component, wherein the specified component comprises the at least one target molecule of the first identifier nucleic acid molecule
  • FIG. 1 schematically illustrates an overview of a process for encoding, writing, accessing, querying, reading, and decoding digital information stored in nucleic acid sequences
  • FIGS. 2A and 2B schematically illustrate an example method of encoding digital data, referred to as “data at address”, using objects or identifiers (e.g., nucleic acid molecules);
  • FIG. 2A illustrates combining a rank object (or address object) with a byte-value object (or data object) to create an identifier;
  • FIG. 2B illustrates an embodiment of the data at address method wherein the rank objects and byte-value objects are themselves combinatorial concatenations of other objects;
  • FIGS. 3A and 3B schematically illustrate an example method of encoding digital information using objects or identifiers (e.g., nucleic acid sequences);
  • FIG. 3A illustrates encoding digital information using a rank object as an identifier;
  • FIG. 3B illustrates an embodiment of the encoding method wherein the address objects are themselves combinatorial concatenations of other objects;
  • FIG. 4 shows a contour plot, in log space, of a relationship between the combinatorial space of possible identifiers (C, x-axis) and the average number of identifiers (k, y-axis) that may be constructed to store information of a given size (contour lines);
  • FIG. 5 schematically illustrates an overview of a method for writing information to nucleic acid sequences (e.g., deoxyribonucleic acid);
  • FIGS. 6A and 6B illustrate an example method, referred to as the “product scheme”, for constructing identifiers (e.g., nucleic acid molecules) by combinatorially assembling distinct components (e.g., nucleic acid sequences);
  • FIG. 6A illustrates the architecture of identifiers constructed using the product scheme;
  • FIG. 6B illustrates an example of the combinatorial space of identifiers that may be constructed using the product scheme;
  • FIG. 7 schematically illustrates the use of overlap extension polymerase chain reaction to construct identifiers (e.g., nucleic acid molecules) from components (e.g., nucleic acid sequences);
  • FIG. 8 schematically illustrates the use of sticky end ligation to construct identifiers (e.g., nucleic acid molecules) from components (e.g., nucleic acid sequences);
  • FIG. 9 schematically illustrates the use of recombinase assembly to construct identifiers (e.g., nucleic acid molecules) from components (e.g., nucleic acid sequences);
  • FIGS. 10A and 10B demonstrates template directed ligation;
  • FIG. 10A schematically illustrates the use of template directed ligation to construct identifiers (e.g., nucleic acid molecules) from components (e.g., nucleic acid sequences);
  • FIG. 10B shows a histogram of the copy numbers (abundances) of 256 distinct nucleic acid sequences that were each combinatorially assembled from six nucleic acid sequences (e.g., components) in one pooled template directed ligation reaction;
  • FIGS. 11A-11G schematically illustrate an example method, referred to as the “permutation scheme”, for constructing identifiers (e.g., nucleic acid molecules) with permuted components (e.g., nucleic acid sequences);
  • FIG. 11A illustrates the architecture of identifiers constructed using the permutation scheme;
  • FIG. 11B illustrates an example of the combinatorial space of identifiers that may be constructed using the permutation scheme;
  • FIG. 11C shows an example implementation of the permutation scheme with template directed ligation;
  • FIG. 11D shows an example of how the implementation from FIG. 11C may be modified to construct identifiers with permuted and repeated components;
  • FIG. 11E shows how the example implementation from FIG.
  • FIG. 11D may lead to unwanted byproducts that may be removed with nucleic acid size selection
  • FIG. 11F shows another example of how to use template directed ligation and size selection to construct identifiers with permuted and repeated components
  • FIG. 11G shows an example of when size selection may fail to isolate a particular identifier from unwanted byproducts
  • FIGS. 12A-12D schematically illustrate an example method, referred to as the “MchooseK” scheme, for constructing identifiers (e.g., nucleic acid molecules) with any number, K, of assembled components (e.g., nucleic acid sequences) out of a larger number, M, of possible components;
  • FIG. 12A illustrates the architecture of identifiers constructed using the MchooseK scheme;
  • FIG. 12B illustrates an example of the combinatorial space of identifiers that may be constructed using the MchooseK scheme;
  • FIG. 12C shows an example implementation of the MchooseK scheme using template directed ligation;
  • FIG. 12D shows how the example implementation from FIG. 12C may lead to unwanted byproducts that may be removed with nucleic acid size selection;
  • FIGS. 13A and 13B schematically illustrates an example method, referred to as the “partition scheme” for constructing identifiers with partitioned components;
  • FIG. 13A shows an example of the combinatorial space of identifiers that may be constructed using the partition scheme;
  • FIG. 13B shows an example implementation of the partition scheme using template directed ligation
  • FIGS. 14A and 14B schematically illustrates an example method, referred to as the “unconstrained string” (or USS) scheme, for constructing identifiers made up of any string of components from a number of possible components;
  • FIG. 14A shows an example of the combinatorial space of identifiers that may be constructed using the USS scheme;
  • FIG. 14B shows an example implementation of the USS scheme using template directed ligation;
  • FIGS. 15A and 15B schematically illustrates an example method, referred to as “component deletion” for constructing identifiers by removing components from a parent identifier;
  • FIG. 15A shows an example of the combinatorial space of identifiers that may be constructed using the component deletion scheme
  • FIG. 15B shows an example implementation of the component deletion scheme using double stranded targeted cleavage and repair
  • FIG. 16 schematically illustrates a parent identifier with recombinase recognition sites where further identifiers may be constructed by applying recombinases to the parent identifier;
  • FIGS. 17A-17C schematically illustrate an overview of example methods for accessing portions of information stored in nucleic acid sequences by accessing a number of particular identifiers from a larger number of identifiers;
  • FIG. 17A shows example methods for using polymerase chain reaction, affinity tagged probes, and degradation targeting probes to access identifiers containing a specified component;
  • FIG. 17B shows example methods for using polymerase chain reaction to perform ‘OR’ or ‘AND’ operations to access identifiers containing multiple specified components;
  • FIG. 17C shows example methods for using affinity tags to perform ‘OR’ or ‘AND’ operations to access identifiers containing multiple specified components;
  • FIGS. 18A and 18B show examples of encoding, writing, and reading data encoded in nucleic acid molecules
  • FIG. 18A shows an example of encoding, writing, and reading 5,856 bits of data
  • FIG. 18 b shows an example of encoding, writing, and reading 62,824 bits of data
  • FIG. 19 shows a computer system that is programmed or otherwise configured to implement methods provided herein.
  • FIG. 20 shows an example scheme of assembly any two selected double-stranded components from a single parent set of double-stranded components.
  • FIG. 21 shows possible sticky-end component structures made from two oligos, X and Y.
  • FIG. 22 shows an example of building identifiers from components with multiple functional parts.
  • FIG. 23A-23B show an example effect of identifier rank on PCR-based random access.
  • FIG. 24 A- 24 B show an example effect of identifier architectures with non-uniform component distributions on PCR-based random access.
  • FIG. 25 shows an example effect of increasing layers in the identifier architecture on PCR-based random access.
  • FIG. 26 shows an example of a multi-bin positional encoding scheme over an alphabet of nine symbols.
  • FIG. 27 shows an example of a multi-bin identifier distribution encoding scheme with an identifier library of two identifiers and a bin set of three bins allowing encoding any of nine possible messages of four-bit strings.
  • FIG. 28 shows an example of a multi-bin identifier distribution encoding scheme with reuse of identifiers with a library of two identifiers and a bin set of three bins allowing encoding any of 64 possible messages of six-bit strings.
  • FIG. 29 show an example of encoding information in DNA with integer partitioning.
  • FIG. 30 shows an example of an encoding pipeline comprising algorithmic modules for preparing and converting a source bitstream into a build program specification to be interpreted by a Writer.
  • FIG. 31 shows an instance of one embodiment of a data structure for representing an identifier library in a serialized format.
  • FIG. 32 shows an example of two source bitstreams and a universal identifier library prepared for computation using operations defined on identifier pools.
  • FIG. 33 shows the inputs to and results of three examples of logical operations performed on a pool of identifiers illustrating how identifier libraries may be used as a platform for in vitro computation.
  • FIG. 34A-34G show an example of storing an image file and reading it at multiple resolutions.
  • FIG. 35 shows an example method for generating entropy that may be used to create random bit strings.
  • FIG. 36A-36C show an example method for generating and storing entropy (random bit strings)
  • FIG. 37A-37B show an example method for organizing and accessing random bit strings using inputs.
  • FIG. 38 shows an example method for securing and authenticating access to artifacts using physical DNA keys.
  • symbol generally refers to a representation of a unit of digital information. Digital information may be divided or translated into a string of symbols. In an example, a symbol may be a bit and the bit may have a value of ‘0’ or ‘1’.
  • a distinct, or unique, nucleic acid sequence may be a nucleic acid sequence that does not have the same sequence as any other nucleic acid sequence.
  • a distinct, or unique, nucleic acid molecule may not have the same sequence as any other nucleic acid molecule.
  • the distinct, or unique, nucleic acid sequence or molecule may share regions of similarity with another nucleic acid sequence or molecule.
  • component generally refers to a nucleic acid sequence.
  • a component may be a distinct nucleic acid sequence.
  • a component may be concatenated or assembled with one or more other components to generate other nucleic acid sequence or molecules.
  • layer generally refers to group or pool of components. Each layer may comprise a set of distinct components such that the components in one layer are different from the components in another layer. Components from one or more layers may be assembled to generate one or more identifiers.
  • identifier generally refers to a nucleic acid molecule or a nucleic acid sequence that represents the position and value of a bit-string within a larger bit-string. More generally, an identifier may refer to any object that represents or corresponds to a symbol in a string of symbols. In some embodiments, identifiers may comprise one or multiple concatenated components.
  • combinatorial space generally refers to the set of all possible distinct identifiers that may be generated from a starting set of objects, such as components, and a permissible set of rules for how to modify those objects to form identifiers.
  • the size of a combinatorial space of identifiers made by assembling or concatenating components may depend on the number of layers of components, the number of components in each layer, and the particular assembly method used to generate the identifiers.
  • identifier rank generally refers to a relation that defines the order of identifiers in a set.
  • identifier library generally refers to a collection of identifiers corresponding to the symbols in a symbol string representing digital information. In some embodiments, the absence of a given identifier in the identifier library may indicate a symbol value at a particular position.
  • One or more identifier libraries may be combined in a pool, group, or set of identifiers. Each identifier library may include a unique barcode that identifies the identifier library.
  • nucleic acid general refers to deoxyribonucleic acid (DNA), ribonucleic acid (RNA), or a variant thereof.
  • a nucleic acid may include one or more subunits selected from adenosine (A), cytosine (C), guanine (G), thymine (T), and uracil (U), or variants thereof.
  • a nucleotide can include A, C, G, T, or U, or variants thereof.
  • a nucleotide can include any subunit that can be incorporated into a growing nucleic acid strand.
  • Such subunit can be A, C, G, T, or U, or any other subunit that may be specific to one of more complementary A, C, G, T, or U, or complementary to a purine (i.e., A or G, or variant thereof) or pyrimidine (i.e., C, T, or U, or variant thereof).
  • a nucleic acid may be single-stranded or double stranded, in some cases, a nucleic acid is circular.
  • nucleic acid molecule or “nucleic acid sequence,” as used herein, generally refer to a polymeric form of nucleotides, or polynucleotide, that may have various lengths, either deoxyribonucleotides (DNA) or ribonucleotides (RNA), or analogs thereof.
  • nucleic acid sequence may refer to the alphabetical representation of a polynucleotide; alternatively, the term may be applied to the physical polynucleotide itself. This alphabetical representation can be input into databases in a computer having a central processing unit and used for mapping nucleic acid sequences or nucleic acid molecules to symbols, or bits, encoding digital information.
  • Nucleic acid sequences or oligonucleotides may include one or more non-standard nucleotide(s), nucleotide analog(s) and/or modified nucleotides.
  • oligonucleotide generally refers to a single-stranded nucleic acid sequence, and is typically composed of a specific sequence of four nucleotide bases: adenine (A); cytosine (C); guanine (G), and thymine (T) or uracil (U) when the polynucleotide is RNA.
  • A adenine
  • C cytosine
  • G guanine
  • T thymine
  • U uracil
  • modified nucleotides include, but are not limited to diaminopurine, 5-fluorouracil, 5-bromouracil, 5-chlorouracil, 5-iodouracil, hypoxanthine, xantine, 4-acetylcytosine, 5-(carboxyhydroxylmethyl)uracil, 5-carboxymethylaminomethyl-2-thiouridine, 5-carboxymethylaminomethyluracil, dihydrouracil, beta-D-galactosylqueosine, inosine, N6-isopentenyladenine, 1-methylguanine, 1-methylinosine, 2,2-dimethylguanine, 2-methyladenine, 2-methylguanine, 3-methylcytosine, 5-methylcytosine, N6-adenine, 7-methylguanine, 5-methylaminomethyluracil, 5-methoxyaminomethyl-2-thiouracil, beta-D-mannosylqueosine, 5′-methoxycarboxymethyl
  • Nucleic acid molecules may also be modified at the base moiety (e.g., at one or more atoms that typically are available to form a hydrogen bond with a complementary nucleotide and/or at one or more atoms that are not typically capable of forming a hydrogen bond with a complementary nucleotide), sugar moiety or phosphate backbone.
  • Nucleic acid molecules may also contain amine-modified groups, such as aminoallyl-dUTP (aa-dUTP) and aminohexhylacrylamide-dCTP (aha-dCTP) to allow covalent attachment of amine reactive moieties, such as N-hydroxy succinimide esters (NHS).
  • primer generally refers to a strand of nucleic acid that serves as a starting point for nucleic acid synthesis, such as polymerase chain reaction (PCR).
  • PCR polymerase chain reaction
  • an enzyme that catalyzes replication starts replication at the 3′-end of a primer attached to the DNA sample and copies the opposite strand. See Chemical Methods Section D for more information on PCR, including details about primer design.
  • polymerase or “polymerase enzyme,” as used herein, generally refers to any enzyme capable of catalyzing a polymerase reaction.
  • examples of polymerases include, without limitation, a nucleic acid polymerase.
  • the polymerase can be naturally occurring or synthesized.
  • An example polymerase is a 029 polymerase or derivative thereof.
  • a transcriptase or a ligase is used (i.e., enzymes which catalyze the formation of a bond) in conjunction with polymerases or as an alternative to polymerases to construct new nucleic acid sequences.
  • polymerases examples include a DNA polymerase, a RNA polymerase, a thermostable polymerase, a wild-type polymerase, a modified polymerase, E. coli DNA polymerase I, T7 DNA polymerase, bacteriophage T4 DNA polymerase 029 (phi29) DNA polymerase, Taq polymerase, Tth polymerase, Tli polymerase, Pfu polymerase Pwo polymerase, VENT polymerase, DEEPVENT polymerase, Ex-Taq polymerase, LA-Taw polymerase, Sso polymerase Poc polymerase, Pab polymerase, Mth polymerase ES4 polymerase, Tru polymerase, Tac polymerase, Tne polymerase, Tma polymerase, Tca polymerase, Tih polymerase, Tfi polymerase, Platinum Taq polymerases, Tbr polymerase, Tfl polymerase, Pfutubo polymerase, Py
  • kits generally refers to one or more DNA molecule(s) of the same sequence. If “species” is used in a plural sense, then it may be assumed that every species in the plurality of species has a distinct sequence, though this may sometimes be made explicit by writing “distinct species” instead of “species”.
  • Digital information such as computer data, in the form of binary code can comprise a sequence or string of symbols.
  • a binary code may encode or represent text or computer processor instructions using, for example, a binary number system having two binary symbols, typically 0 and 1, referred to as bits.
  • Digital information may be represented in the form of non-binary code which can comprise a sequence of non-binary symbols.
  • Each encoded symbol can be re-assigned to a unique bit string (or “byte”), and the unique bit string or byte can be arranged into strings of bytes or byte streams.
  • a bit value for a given bit can be one of two symbols (e.g., 0 or 1).
  • a byte which can comprise a string of N bits, can have a total of 2 N unique byte-values.
  • a byte comprising 8 bits can produce a total of 2 8 or 256 possible unique byte-values, and each of the 256 bytes can correspond to one of 256 possible distinct symbols, letters, or instructions which can be encoded with the bytes.
  • Raw data e.g., text files and computer instructions
  • Zip files, or compressed data files comprising raw data can also be stored in byte streams, these files can be stored as byte streams in a compressed form, and then decompressed into raw data before being read by the computer.
  • Methods and systems of the present disclosure may be used to encode computer data or information in a plurality of identifiers, each of which may represent one or more bits of the original information.
  • methods and systems of the present disclosure encode data or information using identifiers that each represents two bits of the original information.
  • New methods can encode digital information (e.g., binary code) in a plurality of identifiers, or nucleic acid sequences, comprising combinatorial arrangements of components instead of relying on base-by-base or de-novo nucleic acid synthesis (e.g., phosphoramidite synthesis).
  • digital information e.g., binary code
  • nucleic acid sequences comprising combinatorial arrangements of components instead of relying on base-by-base or de-novo nucleic acid synthesis (e.g., phosphoramidite synthesis).
  • new strategies may produce a first set of distinct nucleic acid sequences (or components) for the first request of information storage, and can there-after re-use the same nucleic acid sequences (or components) for subsequent information storage requests.
  • These approaches can significantly reduce the cost of DNA-based information storage by reducing the role of de-novo synthesis of nucleic acid sequences in the information-to-DNA encoding and writing process.
  • new methods of information-to-DNA writing using identifier construction from components are highly parallelizable processes that do not necessarily use cyclical nucleic acid elongation.
  • new methods may increase the speed of writing digital information to DNA compared to older methods.
  • a method for encoding information into nucleic acid sequences may comprise (a) translating the information into a string of symbols, (b) mapping the string of symbols to a plurality of identifiers, and (c) constructing an identifier library comprising at least a subset of the plurality of identifiers.
  • An individual identifier of the plurality of identifiers may comprise one or more components.
  • An individual component of the one or more components may comprise a nucleic acid sequence.
  • Each symbol at each position in the string of symbols may correspond to a distinct identifier.
  • the individual identifier may correspond to an individual symbol at an individual position in the string of symbols.
  • one symbol at each position in the string of symbols may correspond to the absence of an identifier.
  • a string of binary symbols e.g., bits
  • each occurrence of ‘0’ may correspond to the absence of an identifier.
  • a method for nucleic acid-based computer data storage may comprise (a) receiving computer data, (b) synthesizing nucleic acid molecules comprising nucleic acid sequences encoding the computer data, and (c) storing the nucleic acid molecules having the nucleic acid sequences.
  • the computer data may be encoded in at least a subset of nucleic acid molecules synthesized and not in a sequence of each of the nucleic acid molecules.
  • the present disclosure provides methods for writing and storing information in nucleic acid sequences.
  • the method may comprise, (a) receiving or encoding a virtual identifier library that represents information, (b) physically constructing the identifier library, and (c) storing one or more physical copies of the identifier library in one or more separate locations.
  • An individual identifier of the identifier library may comprise one or more components.
  • An individual component of the one or more components may comprise a nucleic acid sequence.
  • a method for nucleic acid-based computer data storage may comprise (a) receiving computer data, (b) synthesizing a nucleic acid molecule comprising at least one nucleic acid sequence encoding the computer data, and (c) storing the nucleic acid molecule comprising the at least one nucleic acid sequence. Synthesizing the nucleic acid molecule may be in the absence of base-by-base nucleic acid synthesis.
  • a method for writing and storing information in nucleic acid sequences may comprise, (a) receiving or encoding a virtual identifier library that represents information, (b) physically constructing the identifier library, and (c) storing one or more physical copies of the identifier library in one or more separate locations.
  • An individual identifier of the identifier library may comprise one or more components.
  • An individual component of the one or more components may comprise a nucleic acid sequence.
  • the present disclosure provides a method for storing digital information into nucleic acid sequences, the method comprising: (a) receiving the digital information as a string of symbols, wherein each symbol in the string of symbols has a symbol value and a symbol position within the string of symbols; (b) forming a first identifier nucleic acid sequence by: (1) selecting, from a set of distinct component nucleic acid sequences that are separated into M different layers, one component nucleic acid sequence from each of the M layers; (2) depositing the M selected component nucleic acid sequences into a compartment; (3) physically assembling the M selected component nucleic acid sequences in (2) to form the first identifier nucleic acid sequence having first and second end sequences and a third sequence positioned between the first and second end sequences, such that the component nucleic acid sequences from first and second layers correspond to the first and second end sequences of the identifier nucleic acid sequence, and the component nucleic acid sequence in a third layer corresponds to the third sequence of the identifier nucleic acid sequence,
  • the present disclosure provides a method for storing digital information into nucleic acid sequences, the method comprising: (a) receiving the digital information as a string of symbols, wherein each symbol in the string of symbols has a symbol value and a symbol position within the string of symbols, wherein the digital information includes image data represented by a collection of vectors; (b) forming a first identifier nucleic acid sequence by depositing M selected component nucleic acid sequences into a compartment, the M selected component nucleic acid sequences being selected from a set of distinct component nucleic acid sequences that are separated into M different layers, (c) forming a plurality of identifier nucleic acid sequences, each having first and second end sequences and a third sequence positioned between the first and second end sequences and corresponding to a respective symbol position, wherein at least one of the first end sequence, second end sequence, and third sequence of at least one additional identifier nucleic acid sequence is identical to a target sequence of the first identifier nucleic acid sequence in (
  • the present disclosure provides a method for storing digital information into nucleic acid sequences, the method comprising: (a) receiving the digital information as a string of symbols, wherein each symbol in the string of symbols has a symbol value and a symbol position within the string of symbols; (b) forming a first identifier nucleic acid sequence by depositing M selected component nucleic acid sequences into a compartment, the M selected component nucleic acid sequences being selected from a set of distinct component nucleic acid sequences that are separated into M different layers; (c) physically assembling a plurality of identifier nucleic acid sequences, each having first and second end sequences and a third sequence positioned between the first and second end sequences and corresponding to a respective symbol position, wherein at least one of the first end sequence, second end sequence, and third sequence of at least one additional identifier nucleic acid sequence is identical to a target sequence of the first identifier nucleic acid sequence in (b), so as to enable a single probe to select at least two
  • the present disclosure provides a method for storing digital information into nucleic acid sequences, the method comprising: (a) receiving the digital information as a string of symbols, wherein each symbol in the string of symbols has a symbol value and a symbol position within the string of symbols; (b) dividing the string of symbols into one or more blocks of size no greater than a fixed length; (c) forming a first identifier nucleic acid sequence by depositing M selected component nucleic acid sequences into a compartment, the M selected component nucleic acid sequences being selected from a set of distinct component nucleic acid sequences that are separated into M different layers; (d) physically assembling a plurality of identifier nucleic acid sequences, each having first and second end sequences and a third sequence positioned between the first and second end sequences and corresponding to a respective symbol position, wherein at least one of the first end sequence, second end sequence, and third sequence of at least one additional identifier nucleic acid sequence is identical to a target sequence of the first identifie
  • the present disclosure provides a method for storing digital information into nucleic acid sequences, the method comprising: (a) receiving the digital information as a string of symbols, wherein each symbol in the string of symbols has a symbol value and a symbol position within the string of symbols; (b) forming a first identifier nucleic acid sequence by depositing M selected component nucleic acid sequences into a compartment, the M selected component nucleic acid sequences being selected from a set of distinct component nucleic acid sequences that are separated into M different layers; (c) physically assembling a plurality of identifier nucleic acid sequences, each having first and second end sequences and a third sequence positioned between the first and second end sequences and corresponding to a respective symbol position, wherein at least one of the first end sequence, second end sequence, and third sequence of at least one additional identifier nucleic acid sequence is identical to a target sequence of the first identifier nucleic acid sequence in (b), so as to enable a single probe to select at least two
  • the present disclosure provides a method for storing digital information into nucleic acid sequences, the method comprising: (a) receiving the digital information as a string of symbols, wherein each symbol in the string of symbols has a symbol value and a symbol position within the string of symbols; (b) forming a first identifier nucleic acid sequence by: (1) selecting, from a set of distinct component nucleic acid sequences that are separated into M different layers, one component nucleic acid sequence from each of the M layers; (2) depositing the M selected component nucleic acid sequences into a compartment; (c) physically assembling a plurality of identifier nucleic acid sequences, each having first and second end sequences and a third sequence positioned between the first and second end sequences and corresponding to a respective symbol position, wherein at least one of the first end sequence, second end sequence, and third sequence of at least one additional identifier nucleic acid sequence is identical to a target sequence of the first identifier nucleic acid sequence in (b), so as to enable a
  • the present disclosure provides a method for storing digital information into nucleic acid sequences, the method comprising: (a) receiving the digital information as a string of symbols, wherein each symbol in the string of symbols has a symbol value and a symbol position within the string of symbols; (b) forming a first identifier nucleic acid sequence by: (1) selecting, from a set of distinct component nucleic acid sequences that are separated into M different layers, one component nucleic acid sequence from each of the M layers; (2) depositing the M selected component nucleic acid sequences into a compartment; (3) physically assembling the M selected component nucleic acid sequences in (2) to form the first identifier nucleic acid sequence comprising a specified component, wherein the specified component comprises at least one target sequence, to allow access of the identifier containing the specified component; (c) physically assembling a plurality of additional identifier nucleic acid sequences, each having the specified component, wherein the specified component comprises the at least one target sequence of the first identifier nucleic acid sequence in
  • FIG. 1 illustrates an overview process for encoding information into nucleic acid sequences, writing information to the nucleic acid sequences, reading information written to nucleic acid sequences, and decoding the read information.
  • Digital information, or data may be translated into one or more strings of symbols.
  • the symbols are bits and each bit may have a value of either ‘0’ or ‘1’.
  • Each symbol may be mapped, or encoded, to an object (e.g., identifier) representing that symbol.
  • Each symbol may be represented by a distinct identifier.
  • the distinct identifier may be a nucleic acid molecule made up of components.
  • the components may be nucleic acid sequences.
  • the digital information may be written into nucleic acid sequences by generating an identifier library corresponding to the information.
  • the identifier library may be physically generated by physically constructing the identifiers that correspond to each symbol of the digital information. All or any portion of the digital information may be accessed at a time. In an example, a subset of identifiers is accessed from an identifier library. The subset of identifiers may be read by sequencing and identifying the identifiers. The identified identifiers may be associated with their corresponding symbol to decode the digital data.
  • a method for encoding and reading information using the approach of FIG. 1 can, for example, include receiving a bit stream and mapping each one-bit (bit with bit-value of ‘1’) in the bit stream to a distinct nucleic acid identifier using an identifier rank or a nucleic acid index. Constructing a nucleic acid sample pool, or identifier library, comprising copies of the identifiers that correspond to bit values of 1 (and excluding identifiers for bit values of 0).
  • Reading the sample can comprise using molecular biology methods (e.g., sequencing, hybridization, PCR, etc), determining which identifiers are represented in the identifier library, and assigning bit-values of ‘1’ to the bits corresponding to those identifiers and bit-values of ‘0’ elsewhere (again referring to the identifier rank to identify the bits in the original bit-stream that each identifier corresponds to), thus decoding the information into the original encoded bit stream.
  • molecular biology methods e.g., sequencing, hybridization, PCR, etc
  • determining which identifiers are represented in the identifier library e.g., determining which identifiers are represented in the identifier library, and assigning bit-values of ‘1’ to the bits corresponding to those identifiers and bit-values of ‘0’ elsewhere (again referring to the identifier rank to identify the bits in the original bit-stream that each identifier corresponds to), thus decoding the information into the original encoded bit stream.
  • Encoding a string of N distinct bits can use an equivalent number of unique nucleic acid sequences as possible identifiers.
  • This approach to information encoding may use de-novo synthesis of identifiers (e.g., nucleic acid molecules) for each new item of information (string of N bits) to store.
  • identifiers e.g., nucleic acid molecules
  • the cost of newly synthesizing identifiers (equivalent in number to or less than N) for each new item of information to store can be reduced by the one-time de-novo synthesis and subsequent maintenance of all possible identifiers, such that encoding new items of information may involve mechanically selecting and mixing together pre-synthesized (or pre-fabricated) identifiers to form an identifier library.
  • both the cost of (1) de-novo synthesis of up to N identifiers for each new item of information to store or (2) maintaining and selecting from N possible identifiers for each new item of information to store, or any combination thereof may be reduced by synthesizing and maintaining a number (less than N, and in some cases much less than N) of nucleic acid sequences and then modifying these sequences through enzymatic reactions to generate up to N identifiers for each new item of information to store.
  • the identifiers may be rationally designed and selected for ease of read, write, access, copy, and deletion operations.
  • the identifiers may be designed and selected to minimize write errors, mutations, degradation, and read errors. See Chemical Methods Section H on the rational design of DNA sequences that comprise synthetic nucleic acid libraries (such as identifier libraries).
  • FIGS. 2A and 2B schematically illustrate an example method, referred to as “data at address”, of encoding digital data in objects or identifiers (e.g., nucleic acid molecules).
  • FIG. 2A illustrates encoding a bit stream into an identifier library wherein the individual identifiers are constructed by concatenating or assembling a single component that specifies an identifier rank with a single component that specifies a byte-value.
  • the data at address method uses identifiers that encode information modularly by comprising two objects: one object, the “byte-value object” (or “data object”), that identifies a byte-value and one object, the “rank object” (or “address object”), that identifies the identifier rank (or the relative position of the byte in the original bit-stream).
  • FIG. 2B illustrates an example of the data at address method wherein each rank object may be combinatorially constructed from a set of components and each byte-value object may be combinatorially constructed from a set of components.
  • Such combinatorial construction of rank and byte-value objects enables more information to be written into identifiers than if the objects where made from the single components alone (e.g., FIG. 2A ).
  • FIGS. 3A and 3B schematically illustrate another example method of encoding digital information in objects or identifiers (e.g., nucleic acid sequences).
  • FIG. 3A illustrates encoding a bit stream into an identifier library wherein identifiers are constructed from single components that specify identifier rank. The presence of an identifier at a particular rank (or address) specifies a bit-value of ‘1’ and the absence of an identifier at a particular rank (or address) specifies a bit-value of ‘0’.
  • This type of encoding may use identifiers that solely encode rank (the relative position of a bit in the original bit stream) and use the presence or absence of those identifiers in an identifier library to encode a bit-value of ‘1’ or ‘0’, respectively. Reading and decoding the information may include identifying the identifiers present in the identifier library, assigning bit-values of ‘1’ to their corresponding ranks and assigning bit-values of ‘0’ elsewhere.
  • FIG. 3B illustrates an example encoding method where each identifier may be combinatorially constructed from a set of components such that each possible combinatorial construction specifies a rank.
  • a component set may comprise five distinct components.
  • the five distinct components may be assembled to generate ten distinct identifiers, each comprising two of the five components.
  • the ten distinct identifiers may each have a rank (or address) that corresponds to the position of a bit in a bit stream.
  • An identifier library may include the subset of those ten possible identifiers that corresponds to the positions of bit-value ‘1’, and exclude the subset of those ten possible identifiers that corresponds to the positions of the bit-value ‘0’ within a bit stream of length ten.
  • FIG. 4 shows a contour plot, in log space, of a relationship between the combinatorial space of possible identifiers (C, x-axis) and the average number of identifiers (k, y-axis) to be physically constructed in order to store information of a given original size in bits (D, contour lines) using the encoding method shown in FIGS. 3A and 3B .
  • This plot assumes that the original information of size L) is re-coded into a string of C bits (where C may be greater than D) where a number of bits, k, has a bit-value of ‘1’.
  • the plot assumes that information-to-nucleic-acid encoding is performed on the re-coded bit string and that identifiers for positions where the bit-value is ‘1’ are constructed and identifiers for positions where the bit-value is ‘0’ are not constructed.
  • Cchoosek may be the mathematical formula for the number of ways to pick k unordered outcomes from C possibilities.
  • FIG. 5 shows an overview method for writing information into nucleic acid sequences.
  • the information Prior to writing the information, the information may be translated into a string of symbols and encoded into a plurality of identifiers.
  • Writing the information may include setting up reactions to produce possible identifiers.
  • a reaction may be set up by depositing inputs into a compartment.
  • the inputs may comprise nucleic acids, components, templates, enzymes, or chemical reagents.
  • the compartment may be a well, a tube, a position on a surface, a chamber in a microfluidic device, or a droplet within an emulsion.
  • Multiple reactions may be set up in multiple compartments. Reactions may proceed to produce identifiers through programmed temperature incubation or cycling.
  • Reactions may be selectively or ubiquitously removed (e.g., deleted). Reactions may also be selectively or ubiquitously interrupted, consolidated, and purified to collect their identifiers in one pool. Identifiers from multiple identifier libraries may be collected in the same pool.
  • An individual identifier may include a barcode or a tag to identify to which identifier library it belongs. Alternatively, or in addition to, the barcode may include metadata for the encoded information.
  • Supplemental nucleic acids or identifiers may also be included in an identifier pool together with an identifier library. The supplemental nucleic acids or identifiers may include metadata for the encoded information or serve to obfuscate or conceal the encoded information.
  • An identifier rank (e.g., nucleic acid index) can comprise a method or key for determining the ordering of identifiers.
  • the method can comprise a look-up table with all identifiers and their corresponding rank.
  • the method can also comprise a look up table with the rank of all components that constitute identifiers and a function for determining the ordering of any identifier comprising a combination of those components.
  • Such a method may be referred to as lexicographical ordering and may be analogous to the manner in which words in a dictionary are alphabetically ordered.
  • the identifier rank (encoded by the rank object of the identifier) may be used to determine the position of a byte (encoded by the byte-value object of the identifier) within a bit stream.
  • the identifier rank (encoded by the entire identifier itself) for a present identifier may be used to determine the position of bit-value of ‘1’ within a bit stream.
  • a key may assign distinct bytes to unique subsets of identifiers (e.g., nucleic acid molecules) within a sample. For example, in a simple form, a key may assign each bit in a byte to a unique nucleic acid sequence that specifies the position of the bit, and then the presence or absence of that nucleic acid sequence within a sample may specify the bit-value of 1 or 0, respectively.
  • Reading the encoded information from the nucleic acid sample can comprise any number of molecular biology techniques including sequencing, hybridization, or PCR. In some embodiments, reading the encoded dataset may comprise reconstructing a portion of the dataset or reconstructing the entire encoded dataset from each nucleic acid sample.
  • the nucleic acid index can be used along with the presence or absence of a unique nucleic acid sequence and the nucleic acid sample can be decoded into a bit stream (e.g., each string of bits, byte, bytes, or string of bytes).
  • Identifiers may be constructed by combinatorially assembling component nucleic acid sequences.
  • information may be encoded by taking a set of nucleic acid molecules (e.g., identifiers) from a defined group of molecules (e.g., combinatorial space).
  • Each possible identifier of the defined group of molecules may be an assembly of nucleic acid sequences (e.g., components) from a prefabricated set of components that may be divided into layers.
  • Each nucleic acid sequence from X can be assembled to each nucleic acid sequence from Y.
  • the total number of nucleic acid sequences maintained in the two sets may be the sum of x and y
  • the total number of nucleic acid molecules, and hence possible identifiers, that can be generated may be the product of x and y.
  • Even more nucleic acid sequences (e.g., identifiers) can be generated if the sequences from X can be assembled to the sequences of Y in any order.
  • the number of nucleic acid sequences (e.g., identifiers) generated may be twice the product of x and y if the assembly order is programmable.
  • This set of all possible nucleic acid sequences that can be generated may be referred to as XY.
  • the order of the assembled units of unique nucleic acid sequences in XY can be controlled using nucleic acids with distinct 5′ and 3′ ends, and restriction digestion, ligation, polymerase chain reaction (PCR), and sequencing may occur with respect to the distinct 5′ and 3′ ends of the sequences.
  • PCR polymerase chain reaction
  • two layers of 10 distinct nucleic acid molecules may be assembled in a fixed order to produce 10*10 or 100 distinct nucleic acid molecules (e.g., identifiers), or one layer of 5 distinct nucleic acid molecules (e.g., components) and another layer of 10 distinct nucleic acid molecules (e.g., components) may be assembled in any order to produce 100 distinct nucleic acid molecules (e.g., identifiers).
  • Nucleic acid sequences within each layer may comprise a unique (or distinct) sequence, or barcode, in the middle, a common hybridization region on one end, and another common hybridization region on another other end.
  • the barcodes may be designed to be randomly generated. Alternatively, the barcodes may be designed to avoid sequences that may create complications to the construction chemistry of identifiers or sequencing.
  • barcodes may be designed so that each may have a minimum hamming distance from the other barcodes, thereby decreasing the likelihood that base-resolution mutations or read errors may interfere with the proper identification of the barcode. See Chemical Methods Section H on the rational design of DNA sequences.
  • the hybridization region on one end of the nucleic acid sequence may be different in each layer, but the hybridization region may be the same for each member within a layer.
  • Adjacent layers are those that have complementary hybridization regions on their components that allow them to interact with one another.
  • any component from layer X may be able to attach to any component from layer Y because they may have complementary hybridization regions.
  • the hybridization region on the opposite end may serve the same purpose as the hybridization region on the first end.
  • any component from layer Y may attach to any component of layer X on one end and any component of layer Z on the opposite end.
  • FIGS. 6A and 6B illustrate an example method, referred to as the “product scheme”, for constructing identifiers (e.g., nucleic acid molecules) by combinatorially assembling a distinct component (e.g., nucleic acid sequence) from each layer in a fixed order.
  • FIG. 6A illustrates the architecture of identifiers constructed using the product scheme. An identifier may be constructed by combining a single component from each layer in a fixed order. For M layers, each with N components, there are N M possible identifiers.
  • FIG. 6B illustrates an example of the combinatorial space of identifiers that may be constructed using the product scheme. In an example, a combinatorial space may be generated from three layers each comprising three distinct components. The components may be combined such that one component from each layer may be combined in a fixed order. The entire combinatorial space for this assembly method may comprise twenty-seven possible identifiers.
  • FIGS. 7-10 illustrate chemical methods for implementing the product scheme (see FIG. 6 ). Methods depicted in FIGS. 7-10 , along with any other methods for assembling two or more distinct components in a fixed order may be used, for example, to produce any one or more identifiers in an identifier library. Identifiers may be constructed using any of the implementation methods described in FIGS. 7-10 , at any time during the methods or systems disclosed herein. In some instances, all or a portion of the combinatorial space of possible identifiers may be constructed before digital information is encoded or written, and then the writing process may involve mechanically selecting and pooling the identifiers (that encode the information) from the already existing set. In other instances, the identifiers may be constructed after one or more steps of the data encoding or writing process may have occurred (i.e., as information is being written).
  • Enzymatic reactions may be used to assemble components from the different layers or sets. Assembly can occur in a one pot reaction because components (e.g., nucleic acid sequences) of each layer have specific hybridization or attachment regions for components of adjacent layers. For example, a nucleic acid sequence (e.g., component) X1 from layer X, a nucleic acid sequence Y1 from layer Y, and a nucleic acid sequence Z1 from layer Z may form the assembled nucleic acid molecule (e.g., identifier) X1Y1Z1. Additionally, multiple nucleic acid molecules (e.g., identifiers) may be assembled in one reaction by including multiple nucleic acid sequences from each layer.
  • Y1 and Y2 in the one pot reaction of the previous example may yield two assembled products (e.g., identifiers), X1Y1Z1 and X1Y2Z1.
  • This reaction multiplexing may be used to speed up writing time for the plurality of identifiers that are physically constructed. See Chemical Methods Section H for detail about the rational design of DNA sequences as it pertains to assembly efficiency. Assembly of the nucleic acid sequences may be performed in a time period that is less than or equal to about 1 day, 12 hours, 10 hours, 9 hours, 8 hours, 7 hours, 6 hours, 5 hours, 4 hours, 3 hours, 2 hours, or 1 hour.
  • the accuracy of the encoded data may be at least about or equal to about 90%, 95%, 96%, 97%, 98%, 99%, or greater.
  • Identifiers may be constructed in accordance with the product scheme using overlap extension polymerase chain reaction (OEPCR), as illustrated in FIG. 7 .
  • OEPCR overlap extension polymerase chain reaction
  • Each component in each layer may comprise a double-stranded or single stranded (as depicted in the figure) nucleic acid sequence with a common hybridization region on the sequence end that may be homologous and/or complementary to the common hybridization region on the sequence end of components from an adjacent layer.
  • An individual identifier may be constructed by concatenating one component (e.g., unique sequence) from a layer X (or layer 1 ) comprising components X 1 -X A , a second component (e.g., unique sequence) from a layer Y (or layer 2 ) comprising Y 1 -Y A , and a third component (e.g., unique sequence) from layer Z (or layer 3 ) comprising Z 1 -Z B .
  • the components from layer X may have a 3′ end that shares complementarity with the 3′ end on components from layer Y.
  • single-stranded components from layer X and Y may be annealed together at the 3′ end and may be extended using PCR to generate a double-stranded nucleic acid molecule.
  • the generated double-stranded nucleic-acid molecule may be melted to generate a 3′ end that shares complementarity with a 3′ end of a component from layer Z.
  • a component from layer Z may be annealed with the generated nucleic acid molecule and may be extended to generate a unique identifier comprising a single component from layers X, Y, and Z in a fixed order. See Chemical Methods Section A about OEPCR.
  • DNA size selection e.g., with gel extraction, see Chemical Methods Section E
  • PCR polymerase chain reaction
  • Sequential nucleic acid capture with two probes, one for each of the two outermost layers, may also be implemented to isolate fully assembled identifier products from other byproducts that may form in the reaction (see Chemical Methods Section F).
  • Identifiers may be assembled in accordance with the product scheme using sticky end ligation, as illustrated in FIG. 8 .
  • Three layers, each comprising double stranded components e.g., double stranded DNA (dsDNA)
  • dsDNA double stranded DNA
  • identifiers comprising one component from the layer X (or layer 1 ) comprising components X 1 -X A , a second component from the layer Y (or layer 2 ) comprising Y 1 -Y B , and a third component from the layer Z (or layer 3 ) comprising Z 1 -Z C .
  • the components in layer X can comprise a common 3′ overhang, FIG. 8 labeled a, and the components in layer Y can comprise a common, complementary 3′ overhang, a*.
  • the elements in layer Y can comprise a common 3′ overhang, FIG. 8 labeled b, and the elements in layer Z can comprise a common, complementary 3′ overhang, b*.
  • the 3′ overhang in layer X components can be complementary to the 3′ end in layer Y components and the other 3′ overhang in layer Y components can be complementary to the 3′ end in layer Z components allowing the components to hybridize and ligate.
  • a single component from layer Y can ligate to a single component of layer X and a single component of layer Z, ensuring the formation of a complete identifier. See Chemical Methods Section B about sticky end ligation.
  • DNA size selection e.g., with gel extraction, see Chemical Methods Section E) or polymerase chain reaction (PCR) with primers flanking the outer most layers (see Chemical Methods Section D) may be implemented to isolate identifier products from other byproducts that may form in the reaction.
  • Sequential nucleic acid capture with two probes, one for each of the two outermost layers may also be implemented to isolate identifier products from other byproducts that may form in the reaction (see Chemical Methods Section F).
  • the sticky ends for sticky end ligation may be generated by treating the components of each layer with restriction endonucleases (see Chemical Methods Section C for more information about restriction enzyme reactions).
  • the components of multiple layers may be generated from one “parent” set of components.
  • a single parent set of double-stranded components may have complementary restrictions sites on each end (e.g., restriction sites for BamHI and BglII). Any two components may be selected for assembly, and individually digested with one or the other complementary restriction enzymes (e.g., BglII or BamHI) resulting in complementary sticky ends that can be ligated together resulting in an inert scar.
  • complementary restriction enzymes e.g., BglII or BamHI
  • the product nucleic acid sequence may comprise the complementary restriction sites on each end (e.g., BamHI on the 5′ end and BglII on the 3′ end), and can be further ligated to another component from the parent set following the same process. This process may cycle indefinitely ( FIG. 20 ). If the parent comprises N components, then each cycle may be equivalent to adding an extra layer of N components to the product scheme.
  • a method for using ligation to construct a sequence of nucleic acids comprising elements from set X (e.g., set 1 of dsDNA) and elements from set Y (e.g., set 2 of dsDNA) can comprise the steps of obtaining or constructing two or more pools (e.g., set 1 of dsDNA and set 2 of dsDNA) of double stranded sequences wherein a first set (e.g., set 1 of dsDNA) comprises a sticky end (e.g., a) and a second set (e.g., set 2 of dsDNA) comprises a sticky end (e.g., a*) that is complementary to the sticky end of the first set.
  • a first set e.g., set 1 of dsDNA
  • a sticky end e.g., a
  • a second set e.g., set 2 of dsDNA
  • Any DNA from the first set e.g., set 1 of dsDNA
  • any subset of DNA from the second set e.g., set 2 of dsDNA
  • Identifiers may be assembled in accordance with the product scheme using site specific recombination, as illustrated in FIG. 9 .
  • Identifiers may be constructed by assembling components from three different layers.
  • the components in layer X (or layer 1 ) may comprise double-stranded molecules with an attB x recombinase site on one side of the molecule
  • components from layer Y (or layer 2 ) may comprise double-stranded molecules with an attP x recombinase site on one side and an attB y recombinase site on the other side
  • components in layer Z (or layer 3 ) may comprise an attP y recombinase site on one side of the molecule.
  • AttB and attP sites within a pair are capable of recombining in the presence of their corresponding recombinase enzyme.
  • One component from each layer may be combined such that one component from layer X associates with one component from layer Y, and one component from layer Y associates with one component from layer Z.
  • Application of one or more recombinase enzymes may recombine the components to generate a double-stranded identifier comprising the ordered components.
  • DNA size selection for example with gel extraction
  • PCR with primers flanking the outer most layers may be implemented to isolate identifier products from other byproducts that may form in the reaction.
  • multiple orthogonal attB and attP pairs may be used, and each pair may be used to assemble a component from an extra layer.
  • up to six orthogonal attB and attP pairs may be generated per recombinases, and multiple orthogonal recombinases may be implemented as well.
  • thirteen layers may be assembled by using twelve orthogonal attB and attP pairs, six orthogonal pairs from each of two large serine recombinases, such as BxbI and PhiC31. Orthogonality of attB and attP pairs ensures that an attB site from one pair does not react with an attP site from another pair.
  • Recombinase-mediated recombination reactions may be reversible or irreversible depending on the recombinase system implemented.
  • the large serine recombinase family catalyzes irreversible recombination reactions without requiring any high energy cofactors
  • the tyrosine recombinase family catalyzes reversible reactions.
  • Identifiers may be constructed in accordance with the product scheme using template directed ligation (TDL), as shown in FIG. 10A .
  • Template directed ligation utilizes single stranded nucleic acid sequences, referred to as “templates” or “staples”, to facilitate the ordered ligation of components to form identifiers.
  • the templates simultaneously hybridize to components from adjacent layers and hold them adjacent to each other (3′ end against 5′ end) while a ligase ligates them. In the example from FIG. 10A , three layers or sets of single-stranded components are combined.
  • a first layer of components e.g., layer X or layer 1
  • a second layer of components e.g., layer Y or layer 2
  • common sequences b and c on their 5′ and 3′ ends respectively which are complementary to sequences b* and c*
  • a third layer of components e.g., layer Z or layer 3
  • first staple comprising the sequence a*b* (5′ to 3′)
  • second staple comprising a sequence c*d* (′5 to 3′).
  • one or more components from each layer may be selected and mixed into a reaction with the staples, which, by complementary annealing may facilitate the ligation of one component from each layer in a defined order to form an identifier.
  • DNA size selection e.g., with gel extraction, see Chemical Methods Section E
  • PCR polymerase chain reaction
  • primers flanking the outer most layers see Chemical Methods Section D
  • Sequential nucleic acid capture with two probes, one for each of the two outermost layers may also be implemented to isolate identifier products from other byproducts that may form in the reaction (see Chemical Methods Section F).
  • FIG. 10B shows a histogram of the copy numbers (abundances) of 256 distinct nucleic acid sequences that were each assembled with 6-layer TDL.
  • the edge layers first and final layers
  • each of the internal layers had four components.
  • Each edge layer component was 28 bases including a 10 base hybridization region.
  • Each internal layer component was 30 bases including a 10 base common hybridization region on the 5′ end, a 10 base variable (barcode) region, and a 10 base common hybridization region on the 3′ end.
  • Each of the three template strands was 20 bases in length.
  • Identifiers may be constructed in accordance with the product scheme using various other chemical implementations including golden gate assembly, gibson assembly, and ligase cycling reaction assembly.
  • FIGS. 11A and 11B schematically illustrate an example method, referred to as the “permutation scheme”, for constructing identifiers (e.g., nucleic acid molecules) with permuted components (e.g., nucleic acid sequences).
  • FIG. 11A illustrates the architecture of identifiers constructed using the permutation scheme. An identifier may be constructed by combining a single component from each layer in a programmable order.
  • FIG. 11B illustrates an example of the combinatorial space of identifiers that may be constructed using the permutation scheme. In an example, a combinatorial space of size six may be generated from three layers each comprising one distinct component. The components may be concatenated in any order. In general, with M layers, each with N components, the permutation scheme enables a combinatorial space of N M M! total identifiers.
  • FIG. 11C illustrates an example implementation of the permutation scheme with template directed ligation (TDL, see Chemical Methods Section B).
  • TDL template directed ligation
  • Components from multiple layers are assembled in between fixed left end and right end components, referred to as edge scaffolds.
  • These edge scaffolds are the same for all identifiers in the combinatorial space and thus may be added as part of the reaction master mix for the implementation.
  • Templates or staples exist for any possible junction between any two layers or scaffolds such that the order in which components from different layers are incorporated into an identifier in the reaction depends on the templates selected for the reaction.
  • DNA size selection e.g., with gel extraction, see Chemical Methods Section E
  • PCR polymerase chain reaction
  • Primers flanking the outer most layers see Chemical Methods Section D
  • Sequential nucleic acid capture with two probes, one for each of the two outermost layers, may also be implemented to isolate identifier products from other byproducts that may form in the reaction (see Chemical Methods Section F).
  • FIGS. 11D-G illustrate example methods of how the permutation scheme may be expanded to include certain instances of identifiers with repeated components.
  • FIG. 11D shows an example of how the implementation form FIG. 11C may be used to construct identifiers with permuted and repeated components.
  • an identifier may comprise three total components assembled from two distinct components.
  • a component from a layer may be present multiple times in an identifier.
  • Adjacent concatenations of the same component may be achieved by using a staple with adjacent complementary hybridization regions for both the 3′ end and 5′ end of the same component, such as the a*b* (5′ to 3′) staple in the figure.
  • a*b* 5′ to 3′
  • FIG. 11E shows how the example implementation from FIG. 11D may lead to non-targeted nucleic acid sequences, besides the identifier, that are assembled between the edge scaffolds.
  • the appropriate identifier cannot be isolated from non-targeted nucleic acid sequence with PCR because they share the same primer binding sites on the edge.
  • DNA size selection (e.g., with gel extraction) may be implemented to isolate the targeted identifier (e.g., the second sequence from the top) from the non-targeted sequences since each assembled nucleic acid sequence can be designed to have a unique length (e.g., if all components have the same length). See Chemical Methods Section E about size-selection.
  • FIG. 11F shows another example where constructing an identifier with repeated components may generate multiple nucleic acid sequences with equal edge sequences but distinct lengths in the same reaction. In this method, templates that assemble a components in one layer with components in other layers in an alternating pattern may be used. As with the method shown in FIG. 11E , size selection may be used to select identifiers of the designed length.
  • FIG. 11G shows an example where constructing an identifier with repeated components may generate multiple nucleic acid sequences with equal edge sequences and for some nucleic acid sequences (e.g., the third and fourth from the top and the sixth and seventh from the top), equal lengths.
  • those nucleic acid sequences that share equal lengths may be excluded from both being individual identifiers as it may not be possible to construct one without also constructing the other, even if PCR and DNA size selection are implemented.
  • FIGS. 12A-12D schematically illustrate an example method, referred to as the “MchooseK scheme”, for constructing identifiers (e.g., nucleic acid molecules) with any number, K. of assembled components (e.g., nucleic acid sequences) out of a larger number, M, of possible components.
  • FIG. 12A illustrates the architecture of identifiers constructed using the MchooseK scheme. Using this method identifiers are constructed by assembling one component form each layer in any subset of all layers (e.g., choose components from k layers out of M possible layers).
  • FIG. 12B illustrates an example of the combinatorial space of identifiers that may be constructed using the MchooseK scheme.
  • the combinatorial space may comprise N K chooseK possible identifiers for M layers, N components per layer, and an identifier length of K components. In an example, if there are five layers each comprising one component, then up to ten distinct identifiers may be assemble comprising two components each.
  • the MchooseK scheme may be implemented using template directed ligation (See Chemical Methods Section B), as shown in FIG. 12C .
  • components in this example are assembled between edge scaffolds that may or may not be included in the reaction master mix.
  • Templates comprise nucleic acid sequences for the 3′ to 5′ ligation of any two components with lower rank to higher rank, respectively. There are (M+1) 2 +M+1)/2 such templates.
  • An individual identifier of any K components from distinct layers may be constructed by combining those selected components in a ligation reaction with the corresponding K+1 staples used to bring the K components together with the edge scaffolds in their rank order.
  • Such a reaction set up may yield the nucleic acid sequence corresponding to the target identifier between the edge scaffolds.
  • a reaction mix comprising all templates may be combined with the select components to assemble the target identifier.
  • This alternative method may generate various nucleic acid sequences with the same edge sequences but distinct lengths (if all component lengths are equal), as illustrated in FIG. 12D .
  • the target identifier (bottom) may be isolated from byproduct nucleic acid sequences by size. See Chemical Methods Section E about nucleic acid size-selection.
  • FIGS. 13A and 13B schematically illustrate an example method, referred to as the “partition scheme” for constructing identifiers with partitioned components.
  • FIG. 13A shows an example of the combinatorial space of identifiers that may be constructed using the partition scheme.
  • An individual identifier may be constructed by assembling one component from each layer in a fixed order with the optional placement of any partition (specially classified component) between any two components of different layers. For example, a set of components may be organized into one partition component and four layers containing one component each. A component from each layer may be combined in a fixed order and a single partition component may be assembled in various locations between layers.
  • An identifier in this combinatorial space may comprise no partition components, a partition component between the components from the first and second layer, a partition between the components from the second and third layer, and so on to make a combinatorial space of eight possible identifiers.
  • N K (p+1) M-1 possible identifiers that may be constructed. This method may generate identifiers of various lengths.
  • FIG. 13B shows an example implementation of the partition scheme using template directed ligation (See Chemical Methods Section B).
  • Templates comprise nucleic acid sequences for ligating together one component from each of M layers in a fixed order. For each partition component, additional pairs of templates exist that enable the partition component to ligate in between the components from any two adjacent layers.
  • a pair of templates such that one template (with sequence g*b* (5′ to 3′) for example) in a pair enables the 3′ end of layer 1 (with sequence b) to ligate to the 5′ end of the partition component (with sequence g) and such that the second template in the pair (with sequence c*h* (5′ to 3′) for example) enables the 3′ end of the partition component (with sequence h) to ligate to the 5′ end of layer 2 (with sequence c).
  • the standard template for ligating together those layers may be excluded in the reaction and the pair of templates for ligating the partition in that position may be selected in the reaction.
  • targeting the partition component between layer 1 and layer 2 may use the pair of templates c*h* (5′ to 3′) and g*b* (5′ to 3′) to select for the reaction rather than the template c*b* (5′ to 3′).
  • Components may be assembled between edge scaffolds that may be included in the reaction mix (along with their corresponding templates for ligating to the first and Mth layers, respectively).
  • a total of around M ⁇ 1+2*p*(M ⁇ 1) selectable templates may be used for this method for M layers and p partition components.
  • This implementation of the partition scheme may generate various nucleic acid sequences in a reaction with the same edge sequences but distinct lengths.
  • the target identifier may be isolated from byproduct nucleic acid sequences by DNA size selection. Specifically, there may be exactly one nucleic acid sequence product with exactly M layer components. If the layer components are designed large enough compared to the partition components, it may be possible to define a universal size selection region whereby the identifier (and none of the non-targeted byproducts) may be selected regardless of the particular partitioning of the components within the identifier, thereby allowing for multiple partitioned identifiers from multiple reactions to be isolated in the same size selection step. See Chemical Methods Section E about nucleic acid size-selection.
  • FIGS. 14A and 14B schematically illustrates an example method, referred to as the “unconstrained string scheme” or “USS”, for constructing identifiers made up of any string of components from a number of possible components.
  • FIG. 14A shows an example of the combinatorial space of 3-component (or 4-scaffold) length identifiers that may be constructed using the unconstrained string scheme.
  • the unconstrained string scheme constructs an individual identifier of length K components with one or more distinct components each taken from one or more layers, where each distinct component can appear at any of the K component positions in the identifier (allowing for repeats). For example, for two layers, each comprising one component, there are eight possible 3-component length identifiers.
  • FIG. 14B shows an example implementation of the unconstrained string scheme using template directed ligation (see Chemical Methods Section B).
  • K+1 single-stranded and ordered scaffold DNA components are present in the reaction mix.
  • An individual identifier comprises a single component ligated between every pair of adjacent scaffolds. For example, a component ligated between scaffolds A and B, a component ligated between scaffolds C and D, and so on until all K adjacent scaffold junctions are occupied by a component.
  • selected components from different layers are introduced to scaffolds along with selected pairs of staples that direct them to assemble onto the appropriate scaffolds.
  • the pair of staples a*L* (5′ to 3′) and A*b* (5′ to 3′) direct the layer 1 component with a 5′ end region ‘a’ and 3′ end region ‘b’ to ligate in between the L and A scaffolds.
  • 2*M*K selectable staples may be used to construct any USS identifier of length K.
  • nucleic acid byproducts may form in the reaction with equal edge scaffolds as the target identifier, but with less than K components (less than K+1 scaffolds) or with more than K components (more than K+1 scaffolds).
  • the targeted identifier may form with exactly K components (K+1 scaffolds) and may therefore be selectable through techniques like DNA size selection if all components are designed to be equal in length and all scaffolds are designed to be equal in length. See Chemical Methods Section E on nucleic acid size selection.
  • that component may solely comprise a single distinct nucleic acid sequence that fulfills all three roles of (1) an identification barcode, (2) a hybridization region for staple-mediated ligation of the 5′ end to a scaffold, and (3) a hybridization region for staple mediated ligation of the 3′ end to a scaffold.
  • the internal scaffolds illustrated in FIG. 14B may be designed such that they use the same hybridization sequence for both the staple-mediated 5′ ligation of the scaffold to a component and the staple-mediated 3′ ligation of the scaffold to another (not necessarily distinct) component.
  • the depicted one-scaffold, two-staple stacked hybridization events in FIG. 14B represent the statistical back-and-forth hybridization events that occur between the scaffold and each of the staples, thus enabling both 5′ component ligation and 3′ component ligation.
  • the scaffold may be designed with two concatenated hybridization regions—a distinct 3′ hybridization region for staple-mediated 3′ ligation and a distinct 5′ hybridization region for staple-mediated 5′ ligation.
  • FIGS. 15A and 15B schematically illustrate an example method, referred to as the “component deletion scheme”, for constructing identifiers by deleting nucleic acid sequences (or components) from a parent identifier.
  • FIG. 15A shows an example of the combinatorial spaces of possible identifiers that may be constructed using the component deletion scheme.
  • a parent identifier may comprise multiple components.
  • a parent identifier may comprise more than or equal to about 2, 3, 4, 5, 6, 7, 8, 9, 10, 20, 30, 40, 50 or more components.
  • An individual identifier may be constructed by selectively deleting any number of components from N possible components, leading to a “full” combinatorial space of size 2 N , or by deleting a fixed number of K components from N possible components, thus leading to an “NchooseK” combinatorial space of size NchooseK.
  • the full combinatorial space may be 8 and the 3choose2 combinatorial space may be 3.
  • FIG. 15B shows an example implementation of the component deletion scheme using double stranded targeted cleavage and repair (DSTCR).
  • the parent sequence may be a single stranded DNA substrate comprising components flanked by nuclease-specific target sites (which can be 4 or less bases in length), and where the parent may be incubated with one or more double-strand-specific nucleases corresponding to the target sites.
  • An individual component may be targeted for deletion with a complementary single stranded DNA (or cleavage template) that binds the component DNA (and flanking nuclease sites) on the parent, thus forming a stable double stranded sequence on the parent that may be cleaved on both ends by the nucleases.
  • Another single stranded DNA hybridizes to the resulting disjoint ends of the parent (between which the component sequence had been) and brings them together for ligation, either directly or bridged by a replacement sequence, such that the ligated sequences on the parent no longer contain active nuclease-targeted sites.
  • DSTC Double Stranded Targeted Cleavage
  • Size selection may be used to select for identifiers with a certain number of deleted components. See Chemical Methods Section E about nucleic acid size-selection.
  • the parent identifier may be a double or single stranded nucleic acid substrate comprising components separated by spacer sequences such that no two components are flanked by the same sequence.
  • the parent identifier may be incubated with Cas9 nuclease.
  • An individual component may be targeted for deletion with guide ribonucleic acids (the cleavage templates) that bind to the edges of the component and enable Cas9-mediated cleavage at its flanking sites.
  • a single stranded nucleic acid (the repair template) may hybridize to the resulting disjoint ends of the parent identifier (e.g., between the ends where the component sequence had been), thus bringing them together for ligation.
  • Ligation may be done directly or by bridging the ends with a replacement sequence, such that the ligated sequences on the parent no longer contain spacer sequences that can be targeted by Cas9.
  • sequence specific targeted cleavage and repair or “SSTCR”.
  • Identifiers may be constructed by inserting components into a parent identifier using a derivative of DSTCR.
  • a parent identifier may be single stranded nucleic acid substrate comprising nuclease-specific target sites (which can be 4 or less bases in length), each embedded within a distinct nucleic acid sequence.
  • the parent identifier may be incubated with one or more double-strand-specific nucleases corresponding to the target sites.
  • An individual target site on the parent identifier may be targeted for component insertion with a complementary single stranded nucleic acid (the cleavage template) that binds the target site and the distinct surrounding nucleic acid sequence on the parent identifier, thus forming a double stranded site.
  • the double-stranded site may be cleaved by a nuclease.
  • Another single stranded nucleic acid (the repair template) may hybridize to the resulting disjoint ends of the parent identifier and bring them together for ligation, bridged by a component sequence, such that the ligated sequences on the parent no longer contain active nuclease-targeted sites.
  • a derivative of SSTCR may be used to insert components into a parent identifier.
  • the parent identifier may be a double or single-stranded nucleic acid and the parent may be incubated with a Cas9 nuclease.
  • a distinct site on the parent identifier may be targeted for cleavage with a guide RNA (the cleavage template).
  • a single stranded nucleic acid (the repair template) may hybridize to the disjoint ends of the parent identifier and bring them together for ligation, bridged by a component sequence, such that the ligated sequences on the parent identifier no longer contain active nuclease-targeted sites. Size selection may be used to select for identifiers with a certain number of component insertions.
  • FIG. 16 schematically illustrates a parent identifier with recombinase recognition sites.
  • Recognition sites of different patterns can be recognized by different recombinases. All recognition sites for a given set of recombinases are arranged such that the nucleic acids in between them may be excised if the recombinase is applied.
  • unique molecules can be generated using recombinases to excise, shift, invert, and transpose segments of DNA to create different nucleic acid molecules.
  • N recombinases there can be 2 N possible identifiers built from a parent.
  • multiple orthogonal pairs of recognition sites from different recombinases may be arranged on a parent identifier in an overlapping fashion such that the application of one recombinase affects the type of recombination event that occurs when a downstream recombinase is applied (see Roquet et al., Synthetic recombinase-based state machines in living cells, Science 353 (6297): aad8559 (2016), which is entirely incorporated herein by reference).
  • Such a system may be capable of constructing a different identifier for every ordering of N recombinases, N!.
  • Recombinases may be of the tyrosine family such as Flp and Cre, or of the large serine recombinase family such as PhiC31, BxbI, TP901, or A118.
  • the use of recombinases from the large serine recombinase family may be advantageous because they facilitate irreversible recombination and therefore may produce identifiers more efficiently than other recombinases.
  • a single nucleic acid sequence can be programmed to become many distinct nucleic acid sequences by applying numerous recombinases in a distinct order. Approximately ⁇ e 1 M! distinct nucleic acid sequences may be generated by applying M recombinases in different subsets and orders thereof, when the number of recombinases, M, may be less than or equal to 7 for the large serine recombinase family.
  • M When the number of recombinases, M, may be greater than 7, the number of sequences that can be produced approximates 3.9 M , see e.g., Roquet et al., Synthetic recombinase-based state machines in living cells, Science 353 (6297): aad8559 (2016), which is entirely incorporated herein by reference. Additional methods for producing different DNA sequences from one common sequence can include targeted nucleic acid editing enzymes such as CRISPR-Cas, TALENS, and Zinc Finger Nucleases. Sequences produced by recombinases, targeted editing enzymes or the like can be used in conjunction with any of the previous methods, for example methods disclosed in any of the figures and disclosure in the present application.
  • the bit-stream of information to be encoded is larger than that which can be encoded by any single nucleic acid molecule, then the information can be split and indexed with nucleic acid sequence barcodes.
  • any subset of size k nucleic acid molecules from the set of N nucleic acid molecules can be chosen to produce log 2(Nchoosek) bits of information.
  • Barcodes may be assembled onto the nucleic acid molecules within the subsets of size k to encode even longer bit streams. For example, M barcodes may be used to produce M*log 2 (Nchoosek) bits of information.
  • a method for encoding digital information can comprise steps for breaking up the bit stream and encoding the individual elements. For example, a bit stream comprising 6 bits can be split into 3 components each component comprising two bits. Each two bit component can be barcoded to form an information cassette, and grouped or pooled together to form a hyper-pool of information cassettes.
  • Barcodes can facilitate information indexing when the amount of digital information to be encoded exceeds the amount that can fit in one pool alone.
  • Information comprising longer strings of bits and/or multiple bytes can be encoded by layering the approach disclosed in FIG. 3 , for example, by including a tag with unique nucleic acid sequences encoded using the nucleic acid index.
  • Information cassettes or identifier libraries can comprise nitrogenous bases or nucleic acid sequences that include unique nucleic acid sequences that provide location and bit-value information in addition to a barcode or tag which indicates the component or components of the bit stream that a given sequence corresponds to.
  • Information cassettes can comprise one or more unique nucleic acid sequences as well as a barcode or tag.
  • the barcode or tag on the information cassette can provide a reference for the information cassette and any sequences included in the information cassette.
  • the tag or barcode on an information cassette can indicate which portion of the bit stream or bit component of the bit steam the unique sequence encodes information for (e.g., the bit value and bit position information for).
  • a sequence of 10 bits can be separated into two sets of bytes, each byte comprising 5 bits. Each byte can be mapped to a set of 5 possible distinct identifiers. Initially, the identifiers generated for each byte can be the same, but they may be kept in separate pools or else someone reading the information may not be able to tell which byte a particular nucleic acid sequence belongs to.
  • each identifier can be barcoded or tagged with a label that corresponds to the byte for which the encoded information applies (e.g., barcode one may be attached to sequences in the nucleic acid pool to provide the first five bits and barcode two may be attached to sequences in the nucleic acid pool to provide the second five bits), and then the identifiers corresponding to the two bytes can be combined into one pool (e.g., “hyper-pool” or one or more identifier libraries).
  • Each identifier library of the one or more combined identifier libraries may comprise a distinct barcode that identifies a given identifier as belonging to a given identifier library.
  • Methods for adding a barcode to each identifier in an identifier library can comprise using PCR, Gibson, ligation, or any other approach that enables a given barcode (e.g., barcode 1 ) to attach to a given nucleic acid sample pool (e.g., barcode 1 to nucleic acid sample pool 1 and barcode 2 to nucleic acid sample pool 2 ).
  • the sample from the hyper-pool can be read with sequencing methods, and sequencing information can be parsed using the barcode or tag.
  • a method using identifier libraries and barcodes with a set of M barcodes and N possible identifiers can encode a stream of bits with a length equivalent to the product of M and N.
  • identifier libraries may be stored in an array of wells.
  • the array of wells may be defined as having n columns and q rows and each well may comprise two or more identifier libraries in a hyper-pool.
  • the information encoded in each well may constitute one large contiguous item of information of size n ⁇ q larger than the information contained in each of the wells.
  • An aliquot may be taken from one or more of the wells in the array of wells and the encoding may be read using sequencing, hybridization, or PCR.
  • a nucleic acid sample pool, hyper-pool, identifier library, group of identifier libraries, or a well, containing a nucleic acid sample pool or hyper-pool may comprise unique nucleic acid molecules (e.g., identifiers) corresponding to bits of information and a plurality of supplemental nucleic acid sequences.
  • the supplemental nucleic acid sequences may not correspond to encoded data (e.g., do not correspond to a bit value).
  • the supplemental nucleic acid samples may mask or encrypt the information stored in the sample pool.
  • the supplemental nucleic acid sequences may be derived from a biological source or synthetically produced.
  • Supplemental nucleic acid sequences derived from a biological source may include randomly fragmented nucleic acid sequences or rationally fragmented sequences.
  • the biologically derived supplemental nucleic acids may hide or obscure the data-containing nucleic acids within the sample pool by providing natural genetic information along with the synthetically encoded information, especially if the synthetically encoded information (e.g., the combinatorial space of identifiers) is made to resemble natural genetic information (e.g., a fragmented genome).
  • the identifiers are derived from a biological source and the supplemental nucleic acids are derived from a biological source.
  • a sample pool may contain multiple sets of identifiers and supplemental nucleic acid sequences.
  • Each set of identifiers and supplemental nucleic acid sequences may be derived from different organisms.
  • the identifiers are derived from one or more organisms and the supplemental nucleic acid sequences are derived from a single, different organism.
  • the supplemental nucleic acid sequences may also be derived from one or more organism and the identifiers may be derived from a single organism that is different from the organism that the supplemental nucleic acids are derived from. Both the identifiers and the supplemental nucleic acid sequences may be derived from multiple different organisms.
  • a key may be used to distinguish the identifiers from the supplemental nucleic acid sequences.
  • the supplemental nucleic acid sequences may store metadata about the written information.
  • the metadata may comprise extra information for determining and/or authorizing the source of the original information and or the intended recipient of the original information.
  • the metadata may comprise extra information about the format of the original information, the instruments and methods used to encode and write the original information, and the date and time of writing the original information into the identifiers.
  • the metadata may comprise additional information about the format of the original information, the instruments and methods used to encode and write the original information, and the date and time of writing the original information into nucleic acid sequences.
  • the metadata may comprise additional information about modifications made to the original information after writing the information into nucleic acid sequences.
  • the metadata may comprise annotations to the original information or one or more references to external information. Alternatively, or in addition to, the metadata may be stored in one or more barcodes or tags attached to the identifiers.
  • the identifiers in an identifier pool may have the same, similar, or different lengths than one another.
  • the supplemental nucleic acid sequences may have a length that is less than, substantially equal to, or greater than the length of the identifiers.
  • the supplemental nucleic acid sequences may have an average length that is within one base, within two bases, within three bases, within four bases, within five bases, within six bases, within seven bases, within eight bases, within nine bases, within ten bases, or within more bases of the average length of the identifiers.
  • the supplemental nucleic acid sequences are the same or substantially the same length as the identifiers.
  • the concentration of supplemental nucleic acid sequences may be less than, substantially equal to, or greater than the concentration of the identifiers in the identifiers library.
  • the concentration of the supplemental nucleic acids may be less than or equal to about 1%, 10%, 20%, 40%, 60%, 80%, 100, %, 125%, 150%, 175%, 200%, 1000%, 1 ⁇ 10 4 %, 1 ⁇ 10 5 %, 1 ⁇ 10 6 %, 1 ⁇ 10 7 %, 1 ⁇ 10 8 % or less than the concentration of the identifiers.
  • the concentration of the supplemental nucleic acids may be greater than or equal to about 1%, 10%, 20%, 40%, 60%, 80%, 100, %, 125%, 150%, 175%, 200%, 1000%, 1 ⁇ 10 4 %, 1 ⁇ 10 5 %, 1 ⁇ 10 6 %, 1 ⁇ 10 7 %, 1 ⁇ 10 8 %, or more than the concentration of the identifiers. Larger concentrations may be beneficial for obfuscation or concealing data.
  • the concentration of the supplemental nucleic acid sequences are substantially greater (e.g., 1 ⁇ 10 8 % greater) than the concentration of identifiers in an identifier pool.
  • a method for copying information encoded in nucleic acid sequence(s) may comprise (a) providing an identifier library and (b) constructing one or more copies of the identifier library.
  • An identifier library may comprise a subset of a plurality of identifiers from a larger combinatorial space. Each individual identifier of the plurality of identifiers may correspond to an individual symbol in a string of symbols.
  • An identifier may comprise one or more components.
  • a component may comprise a nucleic acid sequence.
  • a method for accessing information encoded in nucleic acid sequences may comprise (a) providing an identifier library, and (b) extracting a portion or a subset of the identifiers present in the identifier library from the identifier library.
  • An identifier library may comprise a subset of a plurality of identifiers from a larger combinatorial space. Each individual identifier of the plurality of identifiers may correspond to an individual symbol in a string of symbols.
  • An identifier may comprise one or more components.
  • a component may comprise a nucleic acid sequence.
  • Information may be written into one or more identifier libraries as described elsewhere herein. Identifiers may be constructed using any method described elsewhere herein.
  • Stored data may be copied by generating copies of the individual identifiers in an identifier library or in one or more identifier libraries. A portion of the identifiers may be copied or an entire library may be copied. Copying may be performed by amplifying the identifiers in an identifier library. When one or more identifier libraries are combined, a single identifier library or multiple identifier libraries may be copied. If an identifier library comprises supplemental nucleic acid sequences, the supplemental nucleic acid sequences may or may not be copied.
  • Identifiers in an identifier library may be constructed to comprise one or more common primer binding sites.
  • the one or more binding sites may be located at the edges of each identifier or interweaved throughout each identifier.
  • the primer binding site may allow for an identifier library specific primer pair or a universal primer pair to bind to and amplify the identifiers.
  • All the identifiers within an identifier library or all the identifiers in one or more identifier libraries may be replicated multiple times by multiple PCR cycles.
  • Conventional PCR may be used to copy the identifiers and the identifiers may be exponentially replicated with each PCR cycle. The number of copies of an identifier may increase exponentially with each PCR cycle.
  • Linear PCR may be used to copy the identifiers and the identifiers may be linearly replicated with each PCR cycle. The number of identifier copies may increase linearly with each PCR cycle.
  • the identifiers may be ligated into a circular vector prior to PCR amplification.
  • the circle vector may comprise a barcode at each end of the identifier insertion site.
  • the PCR primers for amplifying identifiers may be designed to prime to the vector such that the barcoded edges are included with the identifier in the amplification product.
  • recombination between identifiers may result in copied identifiers that comprise non-correlated barcodes on each edge.
  • the non-correlated barcodes may be detectable upon reading the identifiers.
  • Identifiers containing non-correlated barcodes may be considered false positives and may be disregarded during the information decoding process. See Chemical Methods Section D.
  • Information may be encoded by assigning each bit of information to a unique nucleic acid molecule.
  • three sample sets (X, Y, and Z) each containing two nucleic acid sequences may assemble into eight unique nucleic acid molecules and encode eight bits of data:
  • Each bit in a string may then be assigned to the corresponding nucleic acid molecule (e.g., N1 may specify the first bit, N2 may specify the second bit, N3 may specify the third bit, and so forth).
  • the entire bit string may be assigned to a combination of nucleic acid molecules where the nucleic acid molecules corresponding to bit-values of ‘1’ are included in the combination or pool.
  • the letter ‘K’ may be represented by the 8-bit string code 01001011 which may be encoded by the presence of four nucleic acid molecules (e.g., X1Y1Z2, X2Y1Z1, X2Y2Z1, and X2Y2Z2 in the above example).
  • the information may be accessed through sequencing or hybridization assays.
  • primers or probes may be designed to bind to common regions or the barcoded region of the nucleic acid sequence. This may enable amplification of any region of the nucleic acid molecule.
  • the amplification product may then be read by sequencing the amplification product or by a hybridization assay.
  • a primer specific to the barcode region of the X1 nucleic acid sequence and a primer that binds to the common region of the Z set may be used to amplify the nucleic acid molecules. This may return the sequence Y1Z2, which may encode for 0100.
  • the substring of that data may also be accessed by further amplifying the nucleic acid molecules with a primer that binds to the barcode region of the Y1 nucleic acid sequence and a primer that binds to the common sequence of the Z set. This may return the Z2 nucleic acid sequence, encoding the substring 01.
  • the data may be accessed by checking for the presence or absence of a particular nucleic acid sequence without sequencing. For example, amplification with a primer specific to the Y2 barcode may generate amplification products for the Y2 barcode, but not for the Y1 barcode. The presence of Y2 amplification product may signal a bit value of ‘1’. Alternatively, the absence of Y2 amplification products may signal a bit value of ‘0’.
  • PCR based methods can be used to access and copy data from identifier or nucleic acid sample pools. Using common primer binding sites that flank the identifiers in the pools or hyper-pools, nucleic acids containing information can be readily copied. Alternatively, other nucleic acid amplification approaches such as isothermal amplification may also be used to readily copy data from sample pools or hyper-pools (e.g., identifier libraries). See Chemical Methods Section D on nucleic acid amplification.
  • a particular subset of information e.g., all nucleic acids relating to a particular barcode
  • a primer that binds the specific barcode at one edge of the identifier in the forward orientation, along with another primer that binds a common sequence on the opposite edge of the identifier in a reverse orientation.
  • Various read-out methods can be used to pull information from the encoded nucleic acid; for example microarray (or any sort of fluorescent hybridization), digital PCR, quantitative PCR (qPCR), and various sequencing platforms can be further used to read out the encoded sequences and by extension digitally encoded data.
  • Accessing information stored in nucleic acid molecules may be performed by selectively removing the portion of non-targeted identifiers from an identifier library or a pool of identifiers or, for example, selectively removing all identifiers of an identifier library from a pool of multiple identifier libraries.
  • “access” and “query” can be used interchangeably.
  • Accessing data may also be performed by selectively capturing targeted identifiers from an identifier library or pool of identifiers. The targeted identifiers may correspond to data of interest within the larger item of information.
  • a pool of identifiers may comprise supplemental nucleic acid molecules.
  • the supplemental nucleic acid molecules may contain metadata about the encoded information or may be used to encrypt or mask the identifiers corresponding to the information.
  • the supplemental nucleic acid molecules may or may not be extracted while accessing the targeted identifiers.
  • FIGS. 17A-17C schematically illustrate an overview of example methods for accessing portions of information stored in nucleic acid sequences by accessing a number of particular identifiers from a larger number of identifiers.
  • FIG. 17A shows example methods for using polymerase chain reaction, affinity tagged probes, and degradation targeting probes to access identifiers containing a specified component.
  • a pool of identifiers may comprise identifiers with a common sequence at each end, a variable sequence at each end, or one of a common sequence or a variable sequence at each end.
  • the common sequences or variable sequences may be primer binding sites.
  • One or more primers may bind to the common or variable regions on the identifier edges.
  • the identifiers with primers bound may be amplified by PCR.
  • the amplified identifiers may significantly outnumber the non-amplified identifiers.
  • the amplified identifiers may be identified.
  • An identifier from an identifier library may comprise sequences on one or both of its ends that are distinct to that library, thus enabling a single library to be selectively accessed from a pool or group of more than one identifier libraries.
  • the components that constitute the identifiers in a pool may share complementarity with one or more probes.
  • the one or more probes may bind or hybridize to the identifiers to be accessed.
  • the probe may comprise an affinity tag.
  • the affinity tags may be captured on a solid-phase substrate such as a membrane, a well, a column, or a bead. When using a bead as the solid-phase substrate, the affinity tag may bind to a bead, generating a complex comprising a bead, at least one probe, and at least one identifier.
  • the beads may be magnetic, and together with a magnet, the beads may collect and isolate the identifiers to be accessed.
  • the identifiers may be removed from the beads under denaturing conditions prior to reading.
  • the beads may collect the non-targeted identifiers and sequester them away from the rest of the pool that can get washed into a separate vessel and read.
  • the affinity tag may bind to the column.
  • the identifiers to be accessed may bind to the column for capture. Column-bound identifiers may subsequently be eluted or denatured from the column prior to reading.
  • the non-targeted identifiers may be selectively targeted to the column while the targeted identifiers may flow through the column.
  • the identifiers bound to a solid-phase substrate may be removed from the solid-phase substrate, for example, by exposure to conditions such as acid, base, oxidation, reduction, heat, light, metal ion catalysis, displacement or elimination chemistry, or by enzymatic cleavage.
  • the identifiers to be accessed may be attached to a solid support through a cleavable linkage moiety.
  • the solid-phase substrate may be functionalized to provide cleavable linkers for covalent attachment to the targeted identifiers.
  • the linker moiety may be of six or more atoms in length.
  • the cleavable linker may be a TOPS (two oligonucleotides per synthesis) linker, an amino linker, chemically cleavable linker, or a photocleavable linker.
  • Accessing the targeted identifiers may comprise applying one or more probes to a pool of identifiers simultaneously or applying one or more probes to a pool of identifiers sequentially. See Chemical Methods Section F on nucleic acid capture.
  • the components that constitute the identifiers in a pool may share complementarity with one or more degradation-targeting probes.
  • the probes may bind to or hybridize with distinct components on the identifiers.
  • the probe may be a target for a degradation enzyme, such as an endonuclease.
  • one or more identifier libraries may be combined.
  • a set of probes may hybridize with one of the identifier libraries.
  • the set of probes may comprise RNA and the RNA may guide a Cas9 enzyme.
  • a Cas9 enzyme may be introduced to the one or more identifier libraries.
  • the identifiers hybridized with the probes may be degraded by the Cas9 enzyme.
  • the identifiers to be accessed may not be degraded by the degradation enzyme.
  • the identifiers may be single-stranded and the identifier library may be combined with a single-strand specific endonuclease(s), such as the SI nuclease, that selectively degrades identifiers that are not to be accessed.
  • Identifiers to be accessed may be hybridized with a complementary set of identifiers to protect them from degradation by the single-strand specific endonuclease(s).
  • the identifiers to be accessed may be separated from the degradation products by size selection, such as size selection chromatography (e.g., agarose gel electrophoresis).
  • identifiers that are not degraded may be selectively amplified (e.g., using PCR) such that the degradation products are not amplified.
  • the non-degraded identifiers may be amplified using primers that hybridize to each end of the non-degraded identifiers and therefore not to each end of the degraded or cleaved identifiers.
  • FIG. 17B shows example methods for using polymerase chain reaction to perform ‘OR’ or ‘AND’ operations to access identifiers containing multiple components.
  • an ‘OR’ amplification of the union of those sets of identifiers may be accomplished by using the two forward primers together in a multiplex PCR reaction with a reverse primer that binds all of the identifiers on the right end.
  • an ‘AND’ amplification of the intersection of those two sets of identifiers may be accomplished by using the forward primer and the reverse primer together as a primer pair in a PCR reaction.
  • FIG. 17C shows example methods for using affinity tags to perform ‘OR’ or ‘AND’ operations to access identifiers containing multiple components.
  • affinity probe ‘P 1 ’ captures all identifiers with component ‘C 1 ’ and another affinity probe ‘P 2 ’ captures all identifiers with component ‘C 2 ’
  • the set of all identifiers with C 1 or C 2 can be captured by using P 1 and P 2 simultaneously (corresponding to an ‘OR’ operation).
  • the set of all identifiers with C 1 and C 2 can be captures by using P 1 and P 2 sequentially (corresponding to an ‘AND’ operation).
  • a method for reading information encoded in nucleic acid sequences may comprise (a) providing an identifier library, (b) identifying the identifiers present in the identifier library, (c) generating a string of symbols from the identifiers present in the identifier library, and (d) compiling information from the string of symbols.
  • An identifier library may comprise a subset of a plurality of identifiers from a combinatorial space. Each individual identifier of the subset of identifiers may correspond to an individual symbol in a string of symbols.
  • An identifier may comprise one or more components.
  • a component may comprise a nucleic acid sequence.
  • Identifiers may be constructed using any method described elsewhere herein.
  • Stored data may be copied and accessed using any method described elsewhere herein.
  • the identifier may comprise information relating to a location of the encoded symbol, a value of the encoded symbol, or both the location and the value of the encoded symbol.
  • An identifier may include information relating to a location of the encoded symbol and the presence or absence of the identifier in an identifier library may indicate the value of the symbol.
  • the presence of an identifier in an identifier library may indicate a first symbol value (e.g., first bit value) in a binary string and the absence of an identifier in an identifier library may indicate a second symbol value (e.g., second bit value) in a binary string.
  • basing a bit value on the presence or absence of an identifier in an identifier library may reduce the number of identifiers assembled and, therefore, reduce the write time.
  • the presence of an identifier may indicate a bit value of ‘1’ at the mapped location and the absence of an identifier may indicate a bit value of ‘0’ at the mapped location.
  • decoding nucleic acid encoded data may be achieved by base-by-base sequencing of the nucleic acid strands, such as Illumina® Sequencing, or by utilizing a sequencing technique that indicates the presence or absence of specific nucleic acid sequences, such as fragmentation analysis by capillary electrophoresis.
  • the sequencing may employ the use of reversible terminators.
  • the sequencing may employ the use of natural or non-natural (e.g., engineered) nucleotides or nucleotide analogs.
  • decoding nucleic acid sequences may be performed using a variety of analytical techniques, including but not limited to, any methods that generate optical, electrochemical, or chemical signals.
  • PCR polymerase chain reaction
  • digital PCR Sanger sequencing
  • high-throughput sequencing sequencing-by-synthesis
  • single-molecule sequencing sequencing-by-ligation
  • RNA-Seq IIlumina
  • Next generation sequencing Digital Gene Expression (Helicos)
  • Cetos Chromosomes
  • Solexa Single MicroArray
  • shotgun sequencing Maxim-Gilbert sequencing
  • massively-parallel sequencing PCR
  • PCR polymerase chain reaction
  • digital PCR Sanger sequencing
  • high-throughput sequencing sequencing-by-synthesis
  • single-molecule sequencing sequencing-by-ligation
  • RNA-Seq RNA-Seq (Illumina)
  • Next generation sequencing Digital Gene Expression (Helicos)
  • Clonal Single MicroArray Solexa
  • shotgun sequencing Maxim-Gilbert sequencing
  • massively-parallel sequencing massively-parallel sequencing.
  • Various read-out methods can be used to pull information from the encoded nucleic acid.
  • microarray or any sort of fluorescent hybridization
  • digital PCR or any sort of fluorescent hybridization
  • qPCR quantitative PCR
  • sequencing platforms can be further used to read out the encoded sequences and by extension digitally encoded data.
  • An identifier library may further comprise supplemental nucleic acid sequences that provide metadata about the information, encrypt or mask the information, or that both provide metadata and mask the information.
  • the supplemental nucleic acids may be identified simultaneously with identification of the identifiers. Alternatively, the supplemental nucleic acids may be identified prior to or after identifying the identifiers. In an example, the supplemental nucleic acids are not identified during reading of the encoded information.
  • the supplemental nucleic acid sequences may be indistinguishable from the identifiers.
  • An identifier index or a key may be used to differentiate the supplemental nucleic acid molecules from the identifiers.
  • the efficiency of encoding and decoding data may be increased by recoding input bit strings to enable the use of fewer nucleic acid molecules. For example, if an input string is received with a high occurrence of ‘111’ substrings, which may map to three nucleic acid molecules (e.g., identifiers) with an encoding method, it may be recoded to a ‘000’ substring which may map to a null set of nucleic acid molecules. The alternate input substring of ‘000’ may also be recoded to ‘111’. This method of recoding may reduce the total amount of nucleic acid molecules used to encode the data because there may be a reduction in the number of ‘1’s in the dataset.
  • the total size of the dataset may be increased to accommodate a codebook that specifies the new mapping instructions.
  • An alternative method for increasing encoding and decoding efficiency may be to recode the input string to reduce the variable length. For example, ‘111’ may be recoded to ‘00’ which may shrink the size of the dataset and reduce the number of ‘1’s in the dataset.
  • nucleic acid sequences e.g., identifiers
  • nucleic acid sequences that are designed for ease of detection may include nucleic acid sequences comprising a majority of nucleotides that are easier to call and detect based on their optical, electrochemical, chemical, or physical properties.
  • Engineered nucleic acid sequences may be either single or double stranded.
  • Engineered nucleic acid sequences may include synthetic or unnatural nucleotides that improve the detectable properties of the nucleic acid sequence.
  • Engineered nucleic acid sequences may comprise all natural nucleotides, all synthetic or unnatural nucleotides, or a combination of natural, synthetic, and unnatural nucleotides.
  • Synthetic nucleotides may include nucleotide analogues such as peptide nucleic acids, locked nucleic acids, glycol nucleic acids, and threose nucleic acids.
  • Unnatural nucleotides may include dNaM, an artificial nucleoside containing a 3-methoxy-2-naphthly group, and d5SICS, an artificial nucleoside containing a 6-methylisoquinoline-1-thione-2-yl group.
  • Engineered nucleic acid sequences may be designed for a single enhanced property, such as enhanced optical properties, or the designed nucleic acid sequences may be designed with multiple enhanced properties, such as enhanced optical and electrochemical properties or enhanced optical and chemical properties. See Chemical Methods Section H on DNA design.
  • Engineered nucleic acid sequences may comprise reactive natural, synthetic, and unnatural nucleotides that do not improve the optical, electrochemical, chemical, or physical properties of the nucleic acid sequences.
  • the reactive components of the nucleic acid sequences may enable the addition of a chemical moiety that confers improved properties to the nucleic acid sequence.
  • Each nucleic acid sequence may include a single chemical moiety or may include multiple chemical moieties.
  • Example chemical moieties may include, but are not limited to, fluorescent moieties, chemiluminescent moieties, acidic or basic moieties, hydrophobic or hydrophilic moieties, and moieties that alter oxidation state or reactivity of the nucleic acid sequence.
  • a sequencing platform may be designed specifically for decoding and reading information encoded into nucleic acid sequences.
  • the sequencing platform may be dedicated to sequencing single or double stranded nucleic acid molecules.
  • the sequencing platform may decode nucleic acid encoded data by reading individual bases (e.g., base-by-base sequencing) or by detecting the presence or absence of an entire nucleic acid sequence (e.g., component) incorporated within the nucleic acid molecule (e.g., identifier).
  • the sequencing platform may include the use of promiscuous reagents, increased read lengths, and the detection of specific nucleic acid sequences by the addition of detectable chemical moieties.
  • the use of more promiscuous reagents during sequencing may increase reading efficiency by enabling faster base calling which in turn may decrease the sequencing time.
  • the use of increased read lengths may enable longer sequences of encoded nucleic acids to be decoded per read.
  • the addition of detectable chemical moiety tags may enable the detection of the presence or absence of a nucleic acid sequence by the presence or absence of a chemical moiety. For example, each nucleic acid sequence encoding a bit of information may be tagged with a chemical moiety that generates a unique optical, electrochemical, or chemical signal. The presence or absence of that unique optical, electrochemical, or chemical signal may indicate a ‘0’ or a ‘1’ bit value.
  • the nucleic acid sequence may comprise a single chemical moiety or multiple chemical moieties.
  • the chemical moiety may be added to the nucleic acid sequence prior to use of the nucleic acid sequence to encode data. Alternatively or in addition to, the chemical moiety may be added to the nucleic acid sequence after encoding the data, but prior to decoding the data.
  • the chemical moiety tag may be added directly to the nucleic acid sequence or the nucleic acid sequence may comprise a synthetic or unnatural nucleotide anchor and the chemical moiety tag may be added to that anchor.
  • Unique codes may be applied to minimize or detect encoding and decoding errors. Encoding and decoding errors may occur from false negatives (e.g., a nucleic acid molecule or identifier not included in a random sampling).
  • An example of an error detecting code may be a checksum sequence that counts the number of identifiers in a contiguous set of possible identifiers that is included in the identifier library. While reading the identifier library, the checksum may indicate how many identifiers from that contiguous set of identifiers to expect to retrieve, and identifiers can continue to be sampled for reading until the expected number is met.
  • a checksum sequence may be included for every contiguous set of R identifiers where R can be equal in size or greater than 1, 2, 5, 10, 50, 100, 200, 500, or 1000 or less than 1000, 500, 200, 100, 50, 10, 5, or 2. The smaller the value of R, the better the error detection.
  • the checksums may be supplemental nucleic acid sequences.
  • a set comprising seven nucleic acid sequences may be divided into two groups, nucleic acid sequences for constructing identifiers with a product scheme (components X1-X3 in layer X and Y1-Y3 in layer Y), and nucleic acid sequences for the supplemental checksums (X4-X7 and Y4-Y7).
  • the checksum sequences X4-X7 may indicate whether zero, one, two, or three sequences of layer X are assembled with each member of layer Y.
  • the checksum sequences Y4-Y7 may indicate whether zero, one, two, or three sequences of layer Y are assembled with each member of layer X.
  • an original identifier library with identifiers ⁇ X1Y1, X1Y3, X2Y1, X2Y2, X2Y3 ⁇ may be supplemented to include checksums to become the following pool: ⁇ X1Y1, X1Y3, X2Y1, X2Y2, X2Y3, X1Y6, X2Y7, X3Y4, X6Y1, X5Y2, X6Y3 ⁇ .
  • the checksum sequences may also be used for error correction. For example, absence of X1Y1 from the above dataset and the presence of X1Y6 and X6Y1 may enable inference that the X1Y1 nucleic acid molecule is missing from the dataset.
  • the checksum sequences may indicate whether identifiers are missing from a sampling of the identifier library or an accessed portion of the identifier library. In the case of a missing checksum sequence, access methods such as PCR or affinity tagged probe hybridization may amplify and/or isolate it. In some embodiments, the checksums may not be supplemental nucleic acid sequences. They checksums may be coded directly into the information such that they are represented by identifiers.
  • Noise in data encoding and decoding may be reduced by constructing identifiers palindromically, for example, by using palindromic pairs of components rather than single components in the product scheme. Then the pairs of components from different layers may be assembled to one another in a palindromic manner (e.g., YXY instead of XY for components X and Y). This palindromic method may be expanded to larger numbers of layers (e.g., ZYXYZ instead of XYZ) and may enable detection of erroneous cross reactions between identifiers.
  • the identifiers may be enriched from the supplemental nucleic acid sequences.
  • the identifiers may be enriched by a nucleic acid amplification reaction using primers specific to the identifier ends.
  • the information may be decoded without enriching the sample pool by sequencing (e.g., sequencing by synthesis) using a specific primer. In both decoding methods, it may be difficult to enrich or decode the information without having a decoding key or knowing something about the composition of the identifiers.
  • Alternative access methods may also be employed such as using affinity tag based probes.
  • a system for encoding digital information into nucleic acids can comprise systems, methods and devices for converting files and data (e.g., raw data, compressed zip files, integer data, and other forms of data) into bytes and encoding the bytes into segments or sequences of nucleic acids, typically DNA, or combinations thereof.
  • files and data e.g., raw data, compressed zip files, integer data, and other forms of data
  • a system for encoding binary sequence data using nucleic acids may comprise a device and one or more computer processors.
  • the device may be configured to construct an identifier library.
  • the one or more computer processors may be individually or collectively programmed to (i) translate the information into a sting of symbols, (ii) map the string of symbols to the plurality of identifiers, and (iii) construct an identifier library comprising at least a subset of a plurality of identifiers.
  • An individual identifier of the plurality of identifiers may correspond to an individual symbol of the string of symbols.
  • An individual identifier of the plurality of identifiers may comprise one or more components.
  • An individual component of the one or more components may comprise a nucleic acid sequence.
  • a system for reading binary sequence data using nucleic acids may comprise a database and one or more computer processors.
  • the database may store an identifier library encoding the information.
  • the one or more computer processors may be individually or collectively programmed to (i) identify the identifiers in the identifier library, (ii) generate a plurality of symbols from identifiers identified in (i), and (iii) compile the information from the plurality of symbols.
  • the identifier library may comprise a subset of a plurality of identifiers. Each individual identifier of the plurality of identifiers may correspond to an individual symbol in a string of symbols.
  • An identifier may comprise one or more components.
  • a component may comprise a nucleic acid sequence.
  • Non-limiting embodiments of methods for using the system to encode digital data can comprise steps for receiving digital information in the form of byte streams. Parsing the byte streams into individual bytes, mapping the location of a bit within the byte using a nucleic acid index (or identifier rank), and encoding sequences corresponding to either bit values of 1 or bit values of 0 into identifiers.
  • Steps for retrieving digital data can comprise sequencing a nucleic acid sample or nucleic acid pool comprising sequences of nucleic acid (e.g., identifiers) that map to one or more bits, referencing an identifier rank to confirm if the identifier is present in the nucleic acid pool and decoding the location and bit-value information for each sequence into a byte comprising a sequence of digital information.
  • nucleic acid e.g., identifiers
  • a system for encoding and writing information into nucleic acid molecules may include a device and one or more computer processors.
  • the one or more computer processors may be programmed to parse the information into strings of symbols (e.g., strings of bits).
  • the computer processor may generate an identifier rank.
  • the computer processor may categorize the symbols into two or more categories.
  • One category may include symbols to be represented by a presence of the corresponding identifier in the identifier library and the other category may include symbols to be represented by an absence of the corresponding identifiers in the identifier library.
  • the computer processor may direct the device to assemble the identifiers corresponding to symbols to be represented to the presence of an identifier in the identifier library.
  • the device may comprise a plurality regions, sections, or partitions.
  • the reagents and components to assemble the identifiers may be stored in one or more regions, sections, or partitions of the device.
  • Layers may be stored in separate regions of section of the device.
  • a layer may comprise one or more unique components.
  • the component in one layer may be unique from the components in another layer.
  • the regions or sections may comprise vessels and the partitions may comprise wells.
  • Each layer may be stored in a separate vessel or partition.
  • Each reagent or nucleic acid sequence may be stored in a separate vessel or partition.
  • reagents may be combined to form a master mix for identifier construction.
  • the device may transfer reagents, components, and templates from one section of the device to be combined in another section.
  • the device may provide the conditions for completing the assembly reaction. For example, the device may provide heating, agitation, and detection of reaction progress.
  • the constructed identifiers may be directed to undergo one or more subsequent reactions to add barcodes, common sequences, variable sequences, or tags to one or more ends of the identifiers.
  • the identifiers may then be directed to a region or partition to generate an identifier library.
  • One or more identifier libraries may be stored in each region, section, or individual partition of the device.
  • the device may transfer fluid (e.g., reagents, components, templates) using pressure, vacuum, or suction.
  • the identifier libraries may be stored in the device or may be moved to a separate database.
  • the database may comprise one or more identifier libraries.
  • the database may provide conditions for long term storage of the identifier libraries (e.g., conditions to reduce degradation of identifiers).
  • the identifier libraries may be stored in a powder, liquid, or solid form. Aqueous solutions of identifiers may be lyophilized for more stable storage (see Chemical Methods Section G for more information about lyophilization). Alternatively, identifiers may be stored in the absence of oxygen (e.g. anaerobic storage conditions).
  • the database may provide Ultra-Violet light protection, reduced temperature (e.g., refrigeration or freezing), and protection from degrading chemicals and enzymes.
  • the identifier libraries Prior to being transferred to a database, the identifier libraries may be lyophilized or frozen.
  • the identifier libraries may include ethylenediaminetetraacetic acid (EDTA) to inactivate nucleases and/or a buffer to maintain the stability of the nucleic acid molecules.
  • EDTA ethylenediaminetetraacetic acid
  • the database may be coupled to, include, or be separate from a device that writes the information into identifiers, copies the information, accesses the information, or reads the information.
  • a portion of an identifier library may be removed from the database prior to copying, accessing or reading.
  • the device that copies the information from the database may be the same or a different device from that which writes the information.
  • the device that copies the information may extract an aliquot of an identifier library from the device and combine that aliquot with the reagents and constituents to amplify a portion of or the entire identifier library.
  • the device may control the temperature, pressure, and agitation of the amplification reaction.
  • the device may comprise partitions and one or more amplification reaction may occur in the partition comprising the identifier library.
  • the device may copy more than one pool of identifiers at a time.
  • the copied identifiers may be transferred from the copy device to an accessing device.
  • the accessing device may be the same device as the copy device.
  • the access device may comprise separate regions, sections, or partitions.
  • the access device may have one or more columns, bead reservoirs, or magnetic regions for separating identifiers bound to affinity tags (see Chemical Methods Section F about nucleic acid capture).
  • the access device may have one or more size selection units.
  • a size selection unit may include agarose gel electrophoresis or any other method for size selecting nucleic acid molecules (see Chemical Methods Section E for more information about nucleic acid size-selection). Copying and extraction may be performed in the same region of a device or in different regions of a device (see Chemical Methods Section D about nucleic acid amplification).
  • the accessed data may be read in the same device or the accessed data may be transferred to another device.
  • the reading device may comprise a detection unit to detect and identify the identifiers.
  • the detection unit may be part of a sequencer, hybridization array, or other unit for identifying the presence or absence of an identifier.
  • a sequencing platform may be designed specifically for decoding and reading information encoded into nucleic acid sequences.
  • the sequencing platform may be dedicated to sequencing single or double stranded nucleic acid molecules.
  • the sequencing platform may decode nucleic acid encoded data by reading individual bases (e.g., base-by-base sequencing) or by detecting the presence or absence of an entire nucleic acid sequence (e.g., component) incorporated within the nucleic acid molecule (e.g., identifier).
  • the sequencing platform may be a system such as Illumina® Sequencing or fragmentation analysis by capillary electrophoresis.
  • decoding nucleic acid sequences may be performed using a variety of analytical techniques implemented by the device, including but not limited to, any methods that generate optical, electrochemical, or chemical signals.
  • Information storage in nucleic acid molecules may have various applications including, but not limited to, long term information storage, sensitive information storage, and storage of medical information.
  • a person's medical information e.g., medical history and records
  • the information may be stored external to the body (e.g., in a wearable device) or internal to the body (e.g., in a subcutaneous capsule).
  • a sample may be taken from the device or capsule and the information may be decoded with the use of a nucleic acid sequencer.
  • personal storage of medical records in nucleic acid molecules may provide an alternative to computer and cloud based storage systems.
  • Nucleic acid molecules used for capsule-based storage of medical records may be derived from human genomic sequences. The use of human genomic sequences may decrease the immunogenicity of the nucleic acid sequences in the event of capsule failure and leakage.
  • FIG. 19 shows a computer system 1901 that is programmed or otherwise configured to encode digital information into nucleic acid sequences and/or read (e.g., decode) information derived from nucleic acid sequences.
  • the computer system 1901 can regulate various aspects of the encoding and decoding procedures of the present disclosure, such as, for example, the bit-values and bit location information for a given bit or byte from an encoded bitstream or byte stream.
  • the computer system 1901 includes a central processing unit (CPU, also “processor” and “computer processor” herein) 1905 , which can be a single core or multi core processor, or a plurality of processors for parallel processing.
  • the computer system 1901 also includes memory or memory location 1910 (e.g., random-access memory, read-only memory, flash memory), electronic storage unit 1915 (e.g., hard disk), communication interface 1920 (e.g., network adapter) for communicating with one or more other systems, and peripheral devices 1925 , such as cache, other memory, data storage and/or electronic display adapters.
  • the memory 1910 , storage unit 1915 , interface 1920 and peripheral devices 1925 are in communication with the CPU 1905 through a communication bus (solid lines), such as a motherboard.
  • the storage unit 1915 can be a data storage unit (or data repository) for storing data.
  • the computer system 1901 can be operatively coupled to a computer network (“network”) 1930 with the aid of the communication interface 1920 .
  • the network 1930 can be the Internet, an internet and/or extranet, or an intranet and/or extranet that is in communication with the Internet.
  • the network 1930 in some cases is a telecommunication and/or data network.
  • the network 1930 can include one or more computer servers, which can enable distributed computing, such as cloud computing.
  • the network 1930 in some cases with the aid of the computer system 1901 , can implement a peer-to-peer network, which may enable devices coupled to the computer system 1901 to behave as a client or a server.
  • the CPU 1905 can execute a sequence of machine-readable instructions, which can be embodied in a program or software.
  • the instructions may be stored in a memory location, such as the memory 1910 .
  • the instructions can be directed to the CPU 1905 , which can subsequently program or otherwise configure the CPU 1905 to implement methods of the present disclosure. Examples of operations performed by the CPU 1905 can include fetch, decode, execute, and writeback.
  • the CPU 1905 can be part of a circuit, such as an integrated circuit.
  • a circuit such as an integrated circuit.
  • One or more other components of the system 1901 can be included in the circuit.
  • the circuit is an application specific integrated circuit (ASIC).
  • ASIC application specific integrated circuit
  • the storage unit 1915 can store files, such as drivers, libraries and saved programs.
  • the storage unit 1915 can store user data, e.g., user preferences and user programs.
  • the computer system 1901 in some cases can include one or more additional data storage units that are external to the computer system 1901 , such as located on a remote server that is in communication with the computer system 1901 through an intranet or the Internet.
  • the computer system 1901 can communicate with one or more remote computer systems through the network 1930 .
  • the computer system 1901 can communicate with a remote computer system of a user or other devices and or machinery that may be used by the user in the course of analyzing data encoded or decoded in a sequence of nucleic acids (e.g., a sequencer or other system for chemically determining the order of nitrogenous bases in a nucleic acid sequence).
  • remote computer systems include personal computers (e.g., portable PC), slate or tablet PC's (e.g., Apple® iPad, Samsung® Galaxy Tab), telephones, Smart phones (e.g., Apple® iPhone, Android-enabled device, Blackberry®), or personal digital assistants.
  • the user can access the computer system 1901 via the network 1930 .
  • Methods as described herein can be implemented by way of machine (e.g., computer processor) executable code stored on an electronic storage location of the computer system 1901 , such as, for example, on the memory 1910 or electronic storage unit 1915 .
  • the machine executable or machine readable code can be provided in the form of software.
  • the code can be executed by the processor 1905 .
  • the code can be retrieved from the storage unit 1915 and stored on the memory 1910 for ready access by the processor 1905 .
  • the electronic storage unit 1915 can be precluded, and machine-executable instructions are stored on memory 1910 .
  • the code can be pre-compiled and configured for use with a machine having a processor adapted to execute the code, or can be compiled during runtime.
  • the code can be supplied in a programming language that can be selected to enable the code to execute in a pre-compiled or as-compiled fashion.
  • aspects of the systems and methods provided herein can be embodied in programming.
  • Various aspects of the technology may be thought of as “products” or “articles of manufacture” typically in the form of machine (or processor) executable code and/or associated data that is carried on or embodied in a type of machine readable medium.
  • Machine-executable code can be stored on an electronic storage unit, such as memory (e.g., read-only memory, random-access memory, flash memory) or a hard disk.
  • “Storage” type media can include any or all of the tangible memory of the computers, processors or the like, or associated modules thereof, such as various semiconductor memories, tape drives, disk drives and the like, which may provide non-transitory storage at any time for the software programming.
  • All or portions of the software may at times be communicated through the Internet or various other telecommunication networks. Such communications, for example, may enable loading of the software from one computer or processor into another, for example, from a management server or host computer into the computer platform of an application server.
  • another type of media that may bear the software elements includes optical, electrical and electromagnetic waves, such as used across physical interfaces between local devices, through wired and optical landline networks and over various air-links.
  • the physical elements that carry such waves, such as wired or wireless links, optical links or the like, also may be considered as media bearing the software.
  • terms such as computer or machine “readable medium” refer to any medium that participates in providing instructions to a processor for execution.
  • a machine readable medium such as computer-executable code
  • a tangible storage medium such as computer-executable code
  • Non-volatile storage media include, for example, optical or magnetic disks, such as any of the storage devices in any computer(s) or the like, such as may be used to implement the databases, etc. shown in the drawings.
  • Volatile storage media include dynamic memory, such as main memory of such a computer platform.
  • Tangible transmission media include coaxial cables; copper wire and fiber optics, including the wires that comprise a bus within a computer system.
  • Carrier-wave transmission media may take the form of electric or electromagnetic signals, or acoustic or light waves such as those generated during radio frequency (RF) and infrared (IR) data communications.
  • RF radio frequency
  • IR infrared
  • Common forms of computer-readable media therefore include for example: a floppy disk, a flexible disk, hard disk, magnetic tape, any other magnetic medium, a CD-ROM, DVD or DVD-ROM, any other optical medium, punch cards paper tape, any other physical storage medium with patterns of holes, a RM, a ROM, a PROM and EPROM, a FLASH-EPROM, any other memory chip or cartridge, a carrier wave transporting data or instructions, cables or links transporting such a carrier wave, or any other medium from which a computer may read programming code and/or data.
  • Many of these forms of computer readable media may be involved in carrying one or more sequences of one or more instructions to a processor for execution.
  • the computer system 1901 can include or be in communication with an electronic display 1935 that comprises a user interface (UI) 1940 for providing, for example, sequence output data including chromatographs, sequences as well as bits, bytes, or bit streams encoded by or read by a machine or computer system that is encoding or decoding nucleic acids, raw data, files and compressed or decompressed zip files to be encoded or decoded into DNA stored data.
  • UI's include, without limitation, a graphical user interface (GUI) and web-based user interface.
  • GUI graphical user interface
  • Methods and systems of the present disclosure can be implemented by way of one or more algorithms.
  • An algorithm can be implemented by way of software upon execution by the central processing unit 1905 .
  • the algorithm can, for example, be used with a DNA index and raw data or zip file compressed or decompressed data, to determine a customized method for coding digital information from the raw data or zip file compressed data, prior to encoding the digital information.
  • components are assembled in a reaction comprising polymerase and dNTPs (deoxynucleotide tri phosphates comprising dATP, dTTP, dCTP, dGTP or variants or analogs thereof).
  • dNTPs deoxynucleotide tri phosphates comprising dATP, dTTP, dCTP, dGTP or variants or analogs thereof.
  • Components can be single stranded or double stranded nucleic acids.
  • Components to be assembled adjacent to each other may have complementary 3′ ends, complementary 5′ ends, or homology between one component's 5′ end and the adjacent component's 3′ end.
  • hybridization regions are intended to facilitate the formation of hybridized junctions between the components during OEPCR, wherein the 3′ end of one input component (or it's complement) is hybridized to the 3′ end of its intended adjacent component (or it's complement).
  • An assembled double-stranded product can then be formed by polymerase extension. This product may then be assembled to more components through subsequent hybridization and extension.
  • FIG. 7 illustrates an example schematic of OEPCR for assembling three nucleic acids.
  • the OEPCR may comprise cycling between three temperatures: a melting temperature, an annealing temperature, and an extension temperature.
  • the melting temperature is intended to turn double stranded nucleic acids into single stranded nucleic acids, as well as remove the formation of secondary structures or hybridizations within a component or between components.
  • the melting temperature is high, for example above 95 degrees Celsius.
  • the melting temperature may be at least 96, 97, 98, 99, 100, 101, 102, 103, 104, or 105 degrees Celsius. In other embodiments the melting temperature may be at most 95, 94, 93, 92, 91, or 90 degrees Celsius.
  • a higher melting temperature may improve dissociation of nucleic acids and their secondary structures, but may also cause side effects such as the degradation of nucleic acids or the polymerase.
  • Melting temperatures may be applied to the reaction for at least 1, 2, 3, 4, 5 seconds, or above, such as 30 seconds, 1 minute, 2 minutes, or 3 minutes.
  • the annealing temperature is intended to facilitate the formation of hybridization between complementary 3′ ends of intended adjacent components (or their complements).
  • the annealing temperature may match the calculated melting temperature of the intended hybridized nucleic acid formation.
  • the annealing temperature may be within 10 degrees Celsius or more of said melting temperature.
  • the annealing temperature may be at least 25, 30, 50, 55, 60, 65, or 70 degrees Celsius.
  • the melting temperature may depend on the sequence of the intended hybridization region between components. Longer hybridization regions have higher melting temperatures, and hybridization regions with higher percent content of Guanine or Cytosine nucleotides may have higher melting temperatures. It may therefore be possible to design components for OEPCR reactions intended to assemble optimally at particular annealing temperatures. Annealing temperatures may be applied to the reaction for at least 1, 5, 10, 15, 20, 25, or 30 seconds, or above.
  • the extension temperature is intended to initiate and facilitate the nucleic acid chain elongation of hybridized 3′ ends catalyzed by one or more polymerase enzymes.
  • the extension temperature may be set at the temperature in which the polymerase functions optimally in terms of nucleic acid binding strength, elongation speed, elongation stability, or fidelity.
  • the extension temperature may be at least 30, 40, 50, 60, or 70 degrees Celsius, or above. Annealing temperatures may be applied to the reaction for at least 1, 5, 10, 15, 20, 25, 30, 40, 50, or 60 seconds or above. Recommended extension times may be around 15 to 45 seconds per kilobase of expected elongation.
  • the annealing temperature and the extension temperature may be the same.
  • a 2-step temperature cycle may be used instead of a 3-step temperature cycle.
  • Examples of combined annealing and extension temperatures include 60, 65, or 72 degrees Celsius.
  • OEPCR may be performed with one temperature cycle. Such embodiments may involve the intended assembly of just two components. In other embodiments, OEPCR may be performed with multiple temperature cycles. Any give nucleic acid in OEPCR may only assemble to at most one other nucleic acid in one cycle. This is because assembly (or extension or elongation) only occurs at the 3′ end of a nucleic acid and each nucleic acid only has one 3′ end. Therefore, the assembly of multiple components may require multiple temperature cycles. For example, assembling four components may involve 3 temperature cycles. Assembling 6 components may involve 5 temperature cycles. Assembling 10 components may involve 9 temperature cycles. In some embodiments, using more temperature cycles than the minimum required may increase assembly efficiency.
  • nucleic acid sequences in OEPCR may influence the efficiency of their assembly to one another.
  • Nucleic acids with long hybridization regions may hybridize more efficiently at a given annealing temperature compared with nucleic acids with short hybridization regions. This is because a longer hybridized product contains a larger number of stable base-pairs and may therefore be a more stable overall hybridized product than a shorter hybridized product.
  • Hybridization regions may have a length of at least 1, 2, 3 4, 5, 6, 7, 8, 9, 10, or more bases.
  • Hybridization regions with high guanine or cytosine content may hybridize more efficiently at a given temperature than hybridization regions with low guanine or cytosine content. This is because guanine forms a more stable base-pair with cytosine than adenine does with thymine.
  • Hybridization regions may have a guanine or cytosine content (also known as GC content) of anywhere between 0% and 100%.
  • nucleic acid sequence design In addition to hybridization region length and GC content, there are many more aspects of the nucleic acid sequence design that may affect the efficiency of the OEPCR. For example, the formation of undesired secondary structures within a component may interfere with its ability to form a hybridization product with its intended adjacent component. These secondary structures may include hairpin loops. The types of possible secondary structures and their stability (for example meting temperature) for a nucleic acid may be predicted based on the sequence. Design space search algorithms may be used to determine nucleic acid sequences that meet proper length and GC content criteria for efficient OEPCR, while avoiding sequences with potentially inhibitory secondary structures.
  • Design space search algorithms may include genetic algorithms, heuristic search algorithms, meta-heuristic search strategies like tabu search, branch-and-bound search algorithms, dynamic programming-based algorithms, constrained combinatorial optimization algorithms, gradient descent-based algorithms, randomized search algorithms, or combinations thereof.
  • homodimers nucleic acid molecules that hybridize with nucleic acid molecules of the same sequence
  • unwanted heterodimers nucleic acid sequences that hybridize with other nucleic acid sequences aside from their intended assembly partner
  • OEPCR may be optimized by using long hybridization regions with high GC content but short non-hybridization regions with low GC content.
  • the overall length of nucleic acids may be at least 10, 20, 30, 40, 50, 60, 70, 80, 90, or 100 bases, or above. In some embodiments, there may be an optimal length and optimal GC content for the hybridization regions of nucleic acids where the assembly efficiency is optimized.
  • a larger number of distinct nucleic acids in an OEPCR reaction may interfere with the expected assembly efficiency. This is because a larger number of distinct nucleic acid sequences may create a higher probability for undesirable molecular interactions, particularly in the form of heterodimers. Therefore in some embodiments of OEPCR that assemble large numbers of components, nucleic acid sequence constraints may become more stringent for efficient assembly.
  • Primers for amplifying the anticipated final assembled product may be included in an OEPCR reaction.
  • the OEPCR reaction may then be performed with more temperature cycles to improve the yield of the assembled product, not just by creating more assemblies between the constituent components, but also by exponentially amplifying the full assembled product in the manner of conventional PCR (see Chemical Methods Section D).
  • Additives may be included in the OEPCR reaction to improve assembly efficiency.
  • Additives may be included in the OEPCR reaction to improve assembly efficiency.
  • Additive content weight per volume may be at least 0%, 1%, 5%, 10%, 20/o, or more.
  • polymerases may be used for OEPCR.
  • the polymerase can be naturally occurring or synthesized.
  • An example polymerase is a 029 polymerase or derivative thereof.
  • a transcriptase or a ligase is used (i.e., enzymes which catalyze the formation of a bond) in conjunction with polymerases or as an alternative to polymerases to construct new nucleic acid sequences.
  • examples of polymerases include a DNA polymerase, a RNA polymerase, a thermostable polymerase, a wild-type polymerase, a modified polymerase, E.
  • coli DNA polymerase I T7 DNA polymerase, bacteriophage T4 DNA polymerase 429 (phi29) DNA polymerase, Taq polymerase, Tth polymerase.
  • Different polymerases may be stable and function optimally at different temperatures. Moreover, different polymerases have different properties. For example, some polymerases, such a Phusion polymerase, may exhibit 3′ to 5′ exonuclease activity, which may contribute to higher fidelity during nucleic acid elongation. Some polymerases may displace leading sequences during elongation, while others may degrade them or halt elongation. Some polymerases, like Taq, incorporate an adenine base at the 3′ end of nucleic acid sequences. This process is referred to as A-tailing and may be inhibitory to OEPCR as the addition of an Adenine base may disrupt the designed 3′ complementarity between intended adjacent components.
  • OEPCR may also be referred to as polymerase cycling assembly (or PCA).
  • PCA polymerase cycling assembly
  • ligation assembly separate nucleic acids are assembled in a reaction comprising one or more ligase enzymes and additional co-factors.
  • Co-factors may include Adenosine Tri-Phosphate (ATP), Dithiothreitol (DTT), or Magnesium ion (Mg 2+ ).
  • ATP Adenosine Tri-Phosphate
  • DTT Dithiothreitol
  • Mg 2+ Magnesium ion
  • Components in a ligation reaction may be blunt-ended double stranded DNA (dsDNA), single stranded DNA (ssDNA), or partially hybridized single-stranded DNA.
  • a double stranded nucleic acid When a double stranded nucleic acid has an overhang strand on one end, the other strand on the same end may be referred to as a “cavity”. Together, a cavity and overhang form a “sticky end”, also known as a “cohesive-end”.
  • a sticky end may be either a 3′ overhang and a 5′ cavity, or a 5′ overhang and a 3′ cavity.
  • the sticky-ends between two intended adjacent components may be designed to have complementarity such that the overhang of both sticky ends hybridize such that each overhang ends directly adjacent to the beginning of the cavity on the other component.
  • nick a double stranded DNA break
  • ligase a ligase
  • Sticky ends may be created by digesting dsDNA with one or more endonucleases.
  • Endonucleases that may be referred to as restriction enzymes
  • may target specific sites that may be referred to as restriction sites
  • create a staggered cleavage sometimes referred to as a digestion
  • the digest may leave a palindromic overhang (an overhang with a sequence that is the reverse complement of itself). If so, then two components digested with the same endonuclease may form complimentary sticky ends along which they may be assembled with a ligase.
  • the digestion and ligation may occur together in the same reaction if the endonuclease and ligase are compatible.
  • the reaction may occur at a uniform temperature, such as 4, 10, 16, 25, or 37 degrees Celsius.
  • the reaction may cycle between multiple temperatures, such as between 16 degrees Celsius and 37 degrees Celsius. Cycling between multiple temperatures may enable the digestion and ligation to each proceed at their respective optimal temperatures during different parts of the cycle.
  • nucleic acids may be separated from enzymes through phenol-chloroform extraction, ethanol precipitation, magnetic bead capture, and/or silica membrane adsorption, washing, and elution.
  • endonucleases may be used in the same reaction, though care should be taken to ensure that the endonucleases do not interfere with each other and function under similar reaction conditions. Using two endonucleases, one may create orthogonal (non-complementary) sticky ends on both ends of a dsDNA component.
  • Endonuclease digestion will leave sticky ends with phosphorylated 5′ ends.
  • Ligases may only function on phosphorylated 5′ ends, and not on non-phosphorylated 5′ ends. As such, there may not be any need for an intermediate 5′ phosphorylation step in between digestion and ligation.
  • a digested dsDNA component with a palindromic overhang on its sticky end may ligate to itself. To prevent self-ligation, it may be beneficial to dephosphorylate said dsDNA component prior to ligation.
  • endonucleases may target different restriction sites, but leave compatible overhangs (overhangs that are the reverse complement of each other).
  • the product of ligation of sticky ends created with two such endonucleases may result in an assembled product that does not contain a restriction site for either endonuclease at the site of ligation.
  • Such endonucleases form the basis of assembly methods, such as biobricks assembly, that may programmably assemble multiple components using just two endonucleases by performing repetitive digestion-ligation cycles.
  • FIG. 20 illustrates an example of a digestion-ligation cycle using endonucleases BamHI and BglII with compatible overhangs.
  • the endonucleases used to create sticky ends may be type IIS restriction enzymes. These enzymes cleave a fixed number of bases away from their restriction sites in a particular direction, therefore the sequence of the overhangs that they generate may be customized. The overhang sequences need not be palindromic.
  • the same type IIS restriction enzyme may be used to create multiple different sticky ends in the same reaction, or in multiple reactions.
  • one or multiple type IIS restriction enzymes may be used to create components with compatible overhangs in the same reaction, or in multiple reactions.
  • the ligation site between two sticky ends generated by type IIS restriction enzymes may be designed such that it does not form a new restriction site.
  • type IIS restriction enzyme sites may be placed on a dsDNA such that the restriction enzyme cleaves off its own restriction site when it generates a component with a sticky end. Therefore the ligation product between multiple components generated from type IIS restriction enzymes may not contain any restriction sites.
  • Type IIS restriction enzymes may be mixed in a reaction together with ligase to perform the component digestion and ligation together.
  • the temperature of the reaction may be cycled between two or more values to promote optimal digestion and ligation.
  • the digestion may be performed optimally at 37 degrees Celsius and the ligation may be performed optimally at 16 degrees Celsius. More generally, the reaction may cycle between temperature values of at least 0, 5, 10, 15, 20, 25, 30, 35, 40, 45, 50, 55, 60, or 65 degrees Celsius or above.
  • a combined digestion and ligation reaction may be used to assemble at least 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, or 20 components, or more. Examples of assembly reactions that leverage Type IIS restriction enzymes to create sticky ends include Golden Gate Assembly (also known as Golden Gate Cloning) or Modular Cloning (also known as MoClo).
  • exonucleases may be used to create components with sticky ends.
  • 3′ exonucleases may be used to chew back the 3′ ends from dsDNA, thus creating 5′ overhangs.
  • 5′ exonucleases may be used to chew back the 5′ ends from dsDNA thus creating 3′ overhangs.
  • Different exonucleases may have different properties.
  • exonucleases may differ in the direction of their nuclease activity (5′ to 3′ or 3′ to 5′), whether or not they act on ssDNA, whether they act on phosphorylated or non-phosphorylated 5′ ends, whether or not they are able to initiate on a nick, or whether or not they are able to initiate their activity on 5′ cavities, 3′ cavities, 5′ overhangs, or 3′ overhangs.
  • exonucleases include Lambda exonuclease, RecJr, Exonuclease III, Exonuclease I, Exonuclease T, Exonuclease V, Exonuclease VIII, Exonuclease VII, Nuclease BAL_31, T5 Exonuclease, and T7 Exonuclease.
  • Exonuclease may be used in a reaction together with ligase to assemble multiple components.
  • the reaction may occur at a fixed temperature or cycle between multiple temperatures, each ideal for the ligase or the exonuclease, respectively.
  • Polymerase may be included in an assembly reaction with ligase and a 5′-to-3′ exonuclease.
  • the components in such a reaction may be designed such that components intended to assemble adjacent to each other share homologous sequences on their edges.
  • a component X to be assembled with component Y may have a 3′ edge sequence of the form 5′-z-3′
  • the component Y may have a 5′ edge sequence of the form 5′-z-3′, where z is any nucleic acid sequence.
  • Gibson assembly may be performed by using T5 exonuclease, Phusion polymerase, and Taq ligase, and incubating the reaction at 50 degrees Celsius.
  • the use of the thermophilic ligase, Taq enables the reaction to proceed at 50 degrees Celsius, a temperature suitable for all three types of enzymes in the reaction.
  • Gibson assembly may generally refer to any assembly reaction involving polymerase, ligase, and exonuclease.
  • Gibson assembly may be used to assemble at least 2, 3, 4, 5, 6, 7, 8, 9, 10, or more components.
  • Gibson assembly may occur as a one-step, isothermal reaction or as a multi-step reaction with one or more temperature incubations.
  • Gibson assembly may occur at temperatures of at least 30, 40, 50, 60, or 70 degrees, or less.
  • the incubation time for a Gibson assembly may be at least 1, 5, 10, 20, 40, or 80 minutes.
  • Gibson assembly reactions may occur optimally when gibson overlaps between intended adjacent components are a certain length and have sequence features, such as sequences that avoid undesirable hybridization events such as hairpins, homodimers, or unwanted heterodimers.
  • gibson overlaps of at least 20 bases are recommended.
  • Gibson overlaps may be at least 1, 2, 3, 5, 10, 20, 30, 40, 50, 60, 100, or more bases in length.
  • the GC content of a gibson overlap may be anywhere from 0% to 100%.
  • the reaction may also occur with a 3′ exonuclease.
  • the polymerase counteracts the action by extending the 3′ end. This dynamic process may continue until the 5′ overhang (created by the exonuclease) of two components (that share a gibson overlap) hybridize and the polymerase extends the 3′ end of one component far enough to meet the 5′ end of its adjacent component, thus leaving a nick that may be sealed by a ligase.
  • components with sticky ends may be created synthetically, as opposed to enzymatically, by mixing together two single stranded nucleic acids, or oligos, that do not share full complementarity.
  • two oligos, oligo X and oligo Y may be designed to only fully hybridize along a contiguous string of complementary bases that form a substring of a larger string of bases that make up the entirety of either one or both oligos. This complementary string of bases is referred to as the “index region”.
  • the oligos together form a component with a blunt end on one side and a sticky end on the other with a 3′ overhang from oligo Y ( FIG. 21A ). If the index region occupies the entirety of oligo X and only the 3′ end of oligo Y, then the oligos together form a component with a blunt end on one side and a sticky end on the other with a 5′ overhang from oligo Y ( FIG. 21B ).
  • the oligos together form a component with a sticky end on one side with a 3′ overhang from oligo Y and on the other side with a 5′ overhang from oligo Y ( FIG. 21C ). If the index region occupies only the 5′ end of oligo X and only the 5′ end of oligo Y, then the oligos together form a component with a sticky end on one side with a 3′ overhang from oligo Y and on the other side with a 3′ overhang from oligo X ( FIG. 21D ).
  • the oligos together form a component with a sticky end on one side with a 5′ overhang from oligo Y and on the other side with a 5′ overhang from oligo X ( FIG. 21E ).
  • the sequences of the overhangs are defined by the oligo sequences outside of the index region. These overhang sequences may be referred to as hybridization regions as they are the regions along which components hybridize for ligation.
  • the index region and hybridization region(s) of oligos in sticky-end ligation may be designed to facilitate the proper assembly of components.
  • Components with long overhangs may hybridize more efficiently with each other at a given annealing temperature compared with components with short overhangs.
  • Overhangs may have a length of at least 1, 2, 3 4, 5, 6, 7, 8, 9, 10, 15, 20, 30, or more bases.
  • Components with overhangs that contain high guanine or cytosine content may hybridize more efficiently to their complementary component at a given temperature than components with overhangs that contain low guanine or cytosine content. This is because guanine forms a more stable base-pair with cytosine than adenine does with thymine.
  • Overhangs may have a guanine or cytosine content (also known as GC content) of anywhere between 0% and 100%.
  • the GC content and length of the index region of an oligo may also affect ligation efficiency. This is because sticky-end components may assemble more efficiently if the top and bottom strand of each component are stably bound. Therefore, index regions may be designed with higher GC content, longer sequences, and other features that promote higher melting temperatures.
  • the oligo design, for both the index region and overhang sequence(s) may affect the efficiency of the ligation assembly. For example, the formation of undesired secondary structures within a component may interfere with its ability to form an assembled product with its intended adjacent component. This may occur due to either secondary structures in the index region, in the overhang sequence, or in both. These secondary structures may include hairpin loops.
  • Design space search algorithms may be used to determine oligo sequences that meet proper length and GC content criteria for the formation of effective components, while avoiding sequences with potentially inhibitory secondary structures.
  • Design space search algorithms may include genetic algorithms, heuristic search algorithms, meta-heuristic search strategies like tabu search, branch-and-bound search algorithms, dynamic programming-based algorithms, constrained combinatorial optimization algorithms, gradient descent-based algorithms, randomized search algorithms, or combinations thereof.
  • homodimers oligos that hybridize with oligos of the same sequence
  • unwanted heterodimers oligos that hybridize with other oligos aside from their intended assembly partner
  • the formation of homodimers and heterodimers may be predicted and accounted for during oligo design using computation methods and design space search algorithms.
  • oligo sequences or higher GC content may create increased formation of unwanted secondary structures, homodimers, and heterodimers within the ligation reaction. Therefore, in some embodiments, the use of shorter oligos or lower GC content may lead to higher assembly efficiency. These design principles may counteract the design strategies of using long oligos or high GC content for more efficient assembly. As such, there may be an optimal length and optimal GC content for the oligos that make up each component such that the ligation assembly efficiency is optimized.
  • the overall length of oligos to be used in ligation may be at least 10, 20, 30, 40, 50, 60, 70, 80, 90, or 100 bases, or above.
  • the overall GC content of oligos to be used in ligation may be anywhere between 0% and 100%.
  • ligation may also occur between single-stranded nucleic acids using staple (or template or bridge) strands.
  • This method may be referred to as staple strand ligation (SSL), template directed ligation (TDL), or bridge strand ligation.
  • SSL staple strand ligation
  • TDL template directed ligation
  • FIG. 10A for an example schematic of TDL for assembling three nucleic acids.
  • two single stranded nucleic acids hybridize adjacently onto a template, thus forming a nick that may be sealed by a ligase.
  • the same nucleic acid design considerations for sticky end ligation also apply to TDL. Stronger hybridization between the templates and their intended complementary nucleic acid sequences may lead to increased ligation efficiency.
  • sequence features that improve the hybridization stability (or melting temperature) on each side of the template may improve ligation efficiency.
  • These features may include longer sequence length and higher GC content.
  • the length of nucleic acids in TDL, including templates may be at least 5, 10, 20, 30, 40, 50, 60, 70, 80, 90, or 100 bases, or above.
  • the GC content of nucleic acids, including templates may be anywhere between 0% and 100%.
  • TDL in TDL, as with sticky end ligation, care may be taken to design component and template sequences that avoid unwanted secondary structures by using nucleic acid structure-predicting software with sequence space search algorithms. As the components in TDL may be single stranded instead of double stranded, there may be higher incidence of unwanted secondary structures (as compared to sticky end ligation) due to the exposed bases.
  • TDL may also be performed with blunt-ended dsDNA components.
  • the staple in order for the staple strand to properly bridge two single-stranded nucleic acids, the staple may first need to displace or partially displace the full single-stranded complements.
  • the dsDNA may initially be melted with incubation at a high temperature. The reaction may then be cooled thus allowing staple strands to anneal to their proper nucleic acid complements. This process may be made even more efficient by using a relatively high concentration of template compared to dsDNA components, thus enabling the templates to outcompete the proper full-length ssDNA complements for binding.
  • ligation of blunt-ended dsDNA with TDL may be improved through multiple rounds of melting (incubation at higher temperatures) and annealing (incubation at lower temperatures). This process may be referred to as Ligase Cyling Reaction, or LCR.
  • Proper melting and annealing temperatures depend on the nucleic acid sequences. Melting and annealing temperatures may be at least 4, 10, 20, 20, 30, 40, 50, 60, 70, 80, 90, or 100 degrees Celsius. The number of temperature cycles may be at least 1, 5, 10, 15, 20, 15, 30, or more.
  • All ligations may be performed in fixed temperature reactions or in multi-temperature reactions.
  • Ligation temperatures may be at least 0, 4, 10, 20, 20, 30, 40, 50, or 60 degrees Celsius or above.
  • the optimal temperature for ligase activity may differ depending on the type of ligase.
  • the rate at which components adjoin or hybridize in the reaction may differ depending on their nucleic acid sequences. Higher incubation temperatures may promote faster diffusion and therefore increase the frequency with which components temporarily adjoin or hybridize. However increased temperature may also disrupt hydrogen bonds between base pairs and therefore decrease the stability of those adjoined or hybridized component duplexes.
  • the optimal temperature for ligation may depend on the number of nucleic acids to be assembled, the sequences of those nucleic acids, the type of ligase, as well as other factors such as reaction additives. For example, two sticky end components with 4-base complementary overhangs may be assembled faster at 4 degrees Celsius with T4 ligase than at 25 degrees Celsius with T4 ligase. But two sticky-end components with 25-base complementary overhangs may assemble faster at 25 degrees Celsius with T4 ligase than at 4 degrees Celsius with T4 ligase, and perhaps faster than ligation with 4-base overhangs at any temperature. In some embodiments of ligation, it may be beneficial to heat and slowly cool the components for annealing prior to ligase addition.
  • Ligation may be used to assemble at least 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, or more nucleic acids.
  • Ligation incubation times may be at most 30 seconds, 1 minute, 2 minutes, 5 minutes, 10 minutes, 20 minutes, 30 minutes, 1 hour, or longer. Longer incubation times may improve ligation efficiency.
  • Ligation may require nucleic acids with 5′ phosphorylated ends.
  • Nucleic acid components without 5′ phosphorylated ends may be phosphorylated in a reaction with polynucleotide kinase, such as T4 polynucleotide kinase (or T4 PNK).
  • T4 polynucleotide kinase or T4 PNK
  • Other co-factors may be present in the reaction such as ATP, magnesium ion, or DTT.
  • Polynucleotide kinase reactions may occur at 37 degrees Celsius for 30 minutes. Polynucleotide kinase reaction temperatures may be at least 4, 10, 20, 20, 30, 40, 50, or 60 degrees Celsius.
  • Polynucleotide kinase reaction incubation times may be at most, 1 minute, 5 minutes, 10 minutes, 20 minutes, 30 minutes, 60 minutes, or more.
  • the nucleic acid components may be synthetically (as opposed to enzymatically) designed and manufactured with a modified 5′ phosphorylation. Only nucleic acids being assembled on their 5′ ends may require phosphorylation. For example, templates in TDL may not be phosphorylated as they are not intended to be assembled.
  • Additives may be included in a ligation reaction to improve ligation efficiency.
  • DMSO Dimethyl sulfoxide
  • PEG polyethylene glycol
  • 1,2-Propanediol (1,2-Prd) 1,2-Propanediol
  • glycerol Tween-20 or combinations thereof.
  • PEG6000 may be a particularly effective ligation enhancer.
  • PEG6000 may increase ligation efficiency by acting as a crowding agent.
  • the PEG6000 may form aggregated nodules that take up space in the ligase reaction solution and bring the ligase and components to closer proximity.
  • Additive content weight per volume
  • ligases may be used for ligation.
  • the ligases can be naturally occurring or synthesized.
  • Examples of ligases include T4 DNA Ligase, T7 DNA Ligase, T3 DNA Ligase, Taq DNA Ligase, 9°NTM DNA Ligase, E. coli DNA Ligase, and SplintR DNA Ligase.
  • Different ligases may be stable and function optimally at different temperatures. For example, Taq DNA Ligase is thermostable and T4 DNA Ligase is not.
  • different ligases have different properties. For example, T4 DNA Ligase may ligate blunt-ended dsDNA while T7 DNA Ligase may not.
  • Ligation may be used to attach sequencing adapters to a library of nucleic acids.
  • the ligation may be performed with common sticky ends or staples at the ends of each member of the nucleic acid library. If the sticky end or staple at one end of the nucleic acids is distinct from that of the other end, then the sequencing adapters may be ligated asymmetrically.
  • a forward sequencing adapter may be ligated to one end of the members of the nucleic acid library and a reverse sequencing adapter may be ligate to the other end of the members of the nucleic acid library.
  • blunt-ended ligation may be used to attach adapters to a library of blunt-ended double-stranded nucleic acids.
  • Fork adapters may be used to asymmetrically attach adapters to a nucleic acid library with either blunt ends or sticky ends that are equivalent at each end (such as A-tails).
  • Ligation may be inhibited by heat inactivation (for example incubation at 65 degrees Celsius for at least 20 minutes), addition of a denaturant, or addition of a chelator such as EDTA.
  • heat inactivation for example incubation at 65 degrees Celsius for at least 20 minutes
  • a denaturant for example incubation at 65 degrees Celsius for at least 20 minutes
  • a chelator such as EDTA
  • Restriction digests are reactions in which restriction endonucleases (or restriction enzymes) recognize their cognate restriction site on nucleic acids and subsequently cleave (or digest) the nucleic acids containing said restriction site.
  • Type I, type II, type III, or type IV restriction enzymes may be used for restriction digests.
  • Type II restriction enzymes may be the most efficient restriction enzymes for nucleic acid digestions.
  • Type II restriction enzymes may recognize palindromic restriction sites and cleave nucleic acids within the recognition site. Examples of said restriction enzymes (and their restriction sites) include AatII (GACGTC), AfeI (AGCGCT), ApaI (GGGCCC), DpnI (GATC), EcoRI (GAATTC), NgeI (GCTAGC), and many more.
  • restriction enzymes such as DpnI and AfeI
  • DpnI and AfeI may cut their restriction sites in the center, thus leaving blunt-ended dsDNA products.
  • Other restriction enzymes such as EcoRI and AatII, cut their restriction sites off-center, thus leaving dsDNA products with sticky ends (or staggered ends).
  • Some restriction enzymes may target discontinuous restriction sites.
  • the restriction enzyme AlwNI recognizes the restriction site CAGNNNCTG, where N may be either A, T, C, or G. Restriction sites may be at least 2, 4, 6, 8, 10, or more bases long.
  • Type II restriction enzymes cleave nucleic acids outside of their restriction sites.
  • the enzymes may be sub-classified as either Type IIS or Type IIG restriction enzymes. Said enzymes may recognize restriction sites that are non-palindromic. Examples of said restriction enzymes include BbsI, that recognizes GAAAC and creates a staggered cleavage 2 (same strand) and 6 (opposite strand) bases further downstream. Another example includes BsaI, that recognizes GGTCTC and creates a staggered cleavage 1 (same strand) and 5 (opposite strand) bases further downstream. Said restriction enzymes may be used for golden gate assembly or modular cloning (MoClo).
  • restriction enzymes such as BcgI (a Type IIG restriction enzyme) may create a staggered cleavage on both ends of its recognition site.
  • Restriction enzymes may cleave nucleic acids at least 1, 5, 10, 15, 20, or more bases away from their recognition sites. Because said restriction enzymes may create staggered cleavages outside of their recognitions sites, the sequences of the resulting nucleic acid overhangs may be arbitrarily designed. This is as opposed to restriction enzymes that create staggered cleavages within their recognition sites, where the sequence of a resulting nucleic acid overhang is coupled to the sequence of the restriction site. Nucleic acid overhangs created by restriction digests may be at least 1, 2, 3, 4, 5, 6, 7, 8, or more bases long. When restriction enzymes cleave nucleic acids, the resulting 5′ ends contain a phosphate.
  • Restriction digest reaction may contain additives and cofactors including potassium ion, magnesium ion, sodium ion, BSA, S-Adenosyl-L-methionine (SAM), or combinations thereof. Restriction digest reactions may be incubated at 37 degrees Celsius for one hour. Restriction digest reactions may be incubated in temperatures of at least 0, 10, 20, 30, 40, 50, or 60 degrees Celsius. Optimal digest temperatures may depend on the enzymes. Restriction digest reactions may be incubated for at most 1, 10, 30, 60, 90, 120, or more minutes. Longer incubation times may result in increased digestion.
  • SAM S-Adenosyl-L-methionine
  • Nucleic acid amplification may be executed with polymerase chain reaction, or PCR.
  • a starting pool of nucleic acids (referred to as the template pool or template) may be combined with polymerase, primers (short nucleic acid probes), nucleotide tri phosphates (such as dATP, dTTP, dCTP, dGTP, and analogs or variants thereof), and additional cofactors and additives such as betaine, DMSO, and magnesium ion.
  • the template may be single stranded or double stranded nucleic acids.
  • the primer may be a short nucleic acid sequence built synthetically to complement and hybridize to a target sequence in the template pool.
  • the primer may bind each identifier nucleic acid sequence comprising the target sequence in the template pool to select only those identifier nucleic acid sequences which comprise the target sequence.
  • there are two primers in a PCR reaction one to complement a primer binding site on the top strand of a target template, and another to complement a primer binding site on the bottom strand of the target template downstream of the first binding site.
  • the 5′-to-3′ orientation in which these primers bind their target must be facing each other in order to successfully replicate and exponentially amplify the nucleic acid sequence in between them.
  • PCR may typically refer to reactions specifically of said form, it may also be used more generally to refer to any nucleic acid amplification reaction.
  • PCR may comprise cycling between three temperatures: a melting temperature, an annealing temperature, and an extension temperature.
  • the melting temperature is intended to turn double stranded nucleic acids into single stranded nucleic acids, as well as remove the formation of hybridization products and secondary structures.
  • the melting temperature is high, for example above 95 degrees Celsius.
  • the melting temperature may be at least 96, 97, 98, 99, 100, 101, 102, 103, 104, or 105 degrees Celsius. In other embodiments the melting temperature may be at most 95, 94, 93, 92, 91, or 90 degrees Celsius.
  • a higher melting temperature will improve dissociation of nucleic acids and their secondary structures, but may also cause side effects such as the degradation of nucleic acids or the polymerase.
  • Melting temperatures may be applied to the reaction for at least 1, 2, 3, 4, 5 seconds, or above, such as 30 seconds, 1 minute, 2 minutes, or 3 minutes.
  • a longer initial melting temperature step may be recommended for PCR with complex or long template.
  • the annealing temperature is intended to facilitate the formation of hybridization between the primers and their target templates.
  • the annealing temperature may match the calculated melting temperature of the primer.
  • the annealing temperature may be within 10 degrees Celsius or more of said melting temperature.
  • the annealing temperature may be at least 25, 30, 50, 55, 60, 65, or 70 degrees Celsius.
  • the melting temperature may depend on the sequence of the primer. Longer primers may have higher melting temperatures, and primers with higher percent content of Guanine or Cytosine nucleotides may have higher melting temperatures. It may therefore be possible to design primers intended to assemble optimally at particular annealing temperatures.
  • Annealing temperatures may be applied to the reaction for at least 1, 5, 10, 15, 20, 25, or 30 seconds, or above.
  • the primer concentrations may be at high or saturating amounts.
  • Primer concentrations may be 500 nanomolar (nM).
  • Primer concentrations may be at most 1 nM, 10 nM, 100 nM, 1000 nM, or more.
  • the extension temperature is intended to initiate and facilitate the 3′ end nucleic acid chain elongation of primers catalyzed by one or more polymerase enzymes.
  • the extension temperature may be set at the temperature in which the polymerase functions optimally in terms of nucleic acid binding strength, elongation speed, elongation stability, or fidelity.
  • the extension temperature may be at least 30, 40, 50, 60, or 70 degrees Celsius, or above. Annealing temperatures may be applied to the reaction for at least 1, 5, 10, 15, 20, 25, 30, 40, 50, or 60 seconds or above. Recommended extension times may be approximately 15 to 45 seconds per kilobase of expected elongation.
  • the annealing temperature and the extension temperature may be the same.
  • a 2-step temperature cycle may be used instead of a 3-step temperature cycle.
  • Examples of combined annealing and extension temperatures include 60, 65, or 72 degrees Celsius.
  • PCR may be performed with one temperature cycle. Such embodiments may involve turning targeted single stranded template nucleic into double stranded nucleic acid. In other embodiments, PCR may be performed with multiple temperature cycles. If the PCR is efficient, it is expected that the number of target nucleic acid molecules will double each cycle, thereby creating an exponential increase in the number of targeted nucleic acid templates from the original template pool. The efficiency of PCR may vary. Therefore, the actual percent of targeted nucleic acid that is replicated each round may be more or less than 100%. Each PCR cycle may introduce undesirable artifacts such as mutated and recombined nucleic acids. To curtail this potential detriment, a polymerase with high fidelity and high processivity may be used. In addition, a limited number of PCR cycles may be used. PCR may involve at most 1, 5, 10, 15, 20, 25, 30, 35, 40, 45, or more cycles.
  • multiple distinct target nucleic acid sequences may be amplified together in one PCR. If each target sequence has common primer binding sites, then all nucleic acid sequences may be amplified with the same set of primers.
  • PCR may comprise multiple primers intended to each target distinct nucleic acids. Said PCR may be referred to as multiplex PCR. PCR may involve at most 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, or more distinct primers.
  • each PCR cycle may change the relative distribution of the targeted nucleic acids. For example, a uniform distribution may become skewed or non-uniformly distributed.
  • optimal polymerases e.g., with high fidelity and sequence robustness
  • optimal PCR conditions may be used. Factors such as annealing and extension temperature and time may be optimized. In addition, a limited number of PCR cycles may be used.
  • a primer with base mismatches to its targeted primer binding site in the template may be used to mutate the target sequence.
  • a primer with an extra sequence on its 5′ end (known as an overhang) may be used to attach a sequence to its targeted nucleic acid.
  • primers containing sequencing adapters on their 5′ ends may be used to prepare and/or amplify a nucleic acid library for sequencing. Primers that target sequencing adapters may be used to amplify nucleic acid libraries to sufficient enrichment for certain sequencing technologies.
  • linear-PCR (or asymmetric-PCR) is used wherein primers only target one strand (not both strands) of a template.
  • the replicated nucleic acid from each cycle is not complemented to the primers, so the primers do not bind it. Therefore, the primers only replicate the original target template with each cycle, hence the linear (as opposed to exponential) amplification.
  • the amplification from linear-PCR may not be as fast as conventional (exponential) PCR, the maximal yield may be greater.
  • the primer concentration in linear-PCR may not become a limiting factor with increased cycles and increased yield as it would with conventional PCR.
  • Linear-After-The-Exponential-PCR (or LATE-PCR) is a modified version of linear-PCR that may be capable of particularly high yields.
  • nucleic acid amplification the process of melting, annealing, and extension may occur at a single temperature.
  • Such PCR may be referred to as isothermal PCR.
  • Isothermal PCR may leverage temperature-independent methods for dissociating or displacing the fully-complemented strands of nucleic acids from each other in favor of primer binding. Strategies include loop-mediated isothermal amplification, strand displacement amplification, helicase-dependent amplification, and nicking enzyme amplification reaction.
  • Isothermal nucleic acid amplification may occur at temperatures of at most 20, 30, 40, 50, 60, or 70 degrees Celsius or more.
  • PCR may further comprise a fluorescent probe or dye to quantify the amount of nucleic acid in a sample.
  • the dye may interpolate into double stranded nucleic acids.
  • An example of said dye is SYBR Green.
  • a fluorescent probe may also be a nucleic acid sequence attached to a fluorescent unit. The fluorescent unit may be release upon hybridization of the probe to a target nucleic acid and subsequent modification from an extending polymerase unit. Examples of said probes include Taqman probes. Such probes may be used in conjunction with PCR and optical measurement tools (for excitation and detection) to quantify nucleic acid concentration in a sample. This process may be referred to as quantitative PCR (qPCR) or real-time PCR (rtPCR).
  • qPCR quantitative PCR
  • rtPCR real-time PCR
  • a PCR may be performed on single a molecule template (in a process that may be referred to as single-molecule PCR), rather than on a pool of multiple template molecules.
  • emulsion-PCR ePCR
  • the water droplets may also contain PCR reagents, and the water droplets may be held in a temperature-controlled environment capable of requisite temperature cycling for PCR. This way, multiple self-contained PCR reactions may occur simultaneously in high throughput.
  • the stability of oil emulsions may be improved with surfactants.
  • the movement of droplets may be controlled with pressure through microfluidic channels.
  • Microfluidic devices may be used to create droplets, split droplets, merge droplets, inject material intro droplets, and to incubate droplets.
  • the size of water droplets in oil emulsions may be at least 1 picoliter (pL), 10 pL, 100 pL, 1 nanoliter (nL), 10 nL, 100 nL, or more.
  • single-molecule PCR may be performed one a solid-phase substrate.
  • examples include the Illumina solid-phase amplification method or variants thereof.
  • the template pool may be exposed to a solid-phase substrate, wherein the solid phase substrate may immobilize templates at a certain spatial resolution. Bridge amplification may then occur within the spatial neighborhood of each template thereby amplifying single molecules in a high throughput fashion on the substrate.
  • Single-molecule PCR may be useful for amplifying a pool of distinct nucleic acids that may interfere with each other. For example, if multiple distinct nucleic acids share a common sequence region, then recombination between the nucleic acids along this common region may occur during the PCR reaction, resulting in new, recombined nucleic acids. Single-molecule PCR would prevent this potential amplification error as it compartmentalizes distinct nucleic acid sequences from each other so they may not interact. Single-molecule PCR may be particularly useful for preparing nucleic acids for sequencing. Single-molecule PCR mat also be useful for absolute quantitation of a number of targets within a template pool. For example, digital PCR (or dPCR), uses the frequency of distinct single-molecule PCR amplification signals to estimate the number of starting nucleic acid molecules in a sample.
  • a group of nucleic acids may be non-discriminantly amplified using primers for primer binding sites common to all nucleic acids.
  • primers for primer binding sites flank all nucleic acids in a pool.
  • Synthetic nucleic acid libraries may be created or assembled with these common sites for general amplification.
  • PCR may be used to selectively amplify a targeted subset of nucleic acids from a pool, for example, by using primers with primer binding sites that only appear on said targeted subset of nucleic acids.
  • Synthetic nucleic acid libraries may be created or assembled such that nucleic acids belonging to potential sub-libraries of interest all share common primer binding sites on their edges (common within the sub-library but distinct from other sub-libraries) for selective amplification of the sub-library from the more general library.
  • PCR may be combined with nucleic acid assembly reactions (such as ligation or OEPCR) to selectively amplify fully assembled or potentially fully assembled nucleic acids from partially assembled or mis-assembled (or unintended or undesirable) bi-products.
  • the assembly may involve assembling a nucleic acid with a primer binding site on each edge sequence such that only a full assembled nucleic product would contain the requisite two primer binding sites for amplification.
  • a partially assembled product may contain neither or only one of the edge sequences with the primer binding sites, and therefore should not be amplified.
  • a mis-assembled (or unintended or undesirable) product may contain neither or only one of the edge sequences, or both edge sequences but in the incorrect orientation or separated by an incorrect amount of bases. Therefore said mis-assembled product should either not amplify or amplify to create a product of incorrect length.
  • the amplified mis-assembled product of incorrect length may be separated from the amplified fully assembled product of correct length by nucleic acid size selection methods (see Chemical Methods Section E), such as DNA electrophoresis in an agarose gel followed by gel extraction.
  • Additives may be included in the PCR to improve the efficiency of nucleic acid amplification.
  • Additives may be included in the PCR to improve the efficiency of nucleic acid amplification.
  • Additive content weight per volume may be at least 0%, 1%, 5%, 10%, 20%, or more.
  • polymerases may be used for PCR.
  • the polymerase can be naturally occurring or synthesized.
  • An example polymerase is a 029 polymerase or derivative thereof.
  • a transcriptase or a ligase is used (i.e., enzymes which catalyze the formation of a bond) in conjunction with polymerases or as an alternative to polymerases to construct new nucleic acid sequences.
  • examples of polymerases include a DNA polymerase, a RNA polymerase, a thermostable polymerase, a wild-type polymerase, a modified polymerase, E.
  • coli DNA polymerase I T7 DNA polymerase, bacteriophage T4 DNA polymerase ⁇ 29 (phi29) DNA polymerase, Taq polymerase.
  • Different polymerases may be stable and function optimally at different temperatures. Moreover, different polymerases have different properties. For example, some polymerases, such a Phusion polymerase, may exhibit 3′ to 5′ exonuclease activity, which may contribute to higher fidelity during nucleic acid elongation. Some polymerases may displace leading sequences during elongation, while others may degrade them or halt elongation. Some polymerases, like Taq, incorporate an adenine base at the 3′ end of nucleic acid sequences.
  • polymerases may have higher fidelity and processivity than others and may be more suitable to PCR applications, such as sequencing preparation, where it is important for the amplified nucleic acid yield to have minimal mutations and where it is important for the distribution of distinct nucleic acids to maintain uniform distribution throughout amplification.
  • Nucleic acids of a particular size may be selected from a sample using size-selection techniques.
  • size-selection may be performed using gel electrophoresis or chromatography.
  • Liquid samples of nucleic acids may be loaded onto one terminal of a stationary phase or gel (or matrix).
  • a voltage difference may be placed across the gel such that the negative terminal of the gel is the terminal at which the nucleic acid samples are loaded and the positive terminal of the gel is the opposite terminal. Since the nucleic acids have a negatively charged phosphate backbone, they can migrate across the gel to the positive terminal. The size of the nucleic acid can determine its relative speed of migration through the gel. Therefore nucleic acids of different sizes will resolve on the gel as they migrate. Voltage differences may be 100V or 120V.
  • Voltage differences may be at most 50V, 100V, 150V, 200V, 250V, or more. Larger voltage differences may increase the speed of nucleic acid migration and size resolution. However, larger voltage differences may also damage the nucleic acids or the gel. Larger voltage differences may be recommended for resolving nucleic acids of larger sizes.
  • Typical migration times may be between 15 minutes and 60 minutes. Migration times may be at most 10 minutes, 30 minutes, 60 minutes, 90 minutes, 120 minutes, or more. Longer migration times, similar to higher voltage, may lead to better nucleic acid resolution but may lead to increased nucleic acid damage. Longer migration times may be recommended for resolving nucleic acids of larger sizes. For example, a voltage difference of 120V and a migration time of 30 minutes may be sufficient for resolving a 200-base nucleic acid from a 250-base nucleic acid.
  • Gels typically comprise a polymer substance, such as agarose or polyacrylamide, dispersed in a conductive buffer such as TAE (Tris-acetate-EDTA) or TBE (Tris-borate-EDTA).
  • the content (weight per volume) of the substance (e.g. agarose or acrylamide) in the gel may be at most 0.5%, 1%, 2%, 3%, 5%, 10%, 15%, 20%, 25%, or higher. Higher content may decrease migration speed. Higher content may be preferable for resolving smaller nucleic acids.
  • Agarose gels may be better for resolving double stranded DNA (dsDNA).
  • Polyacrylamide gels may be better for resolving single stranded DNA (ssDNA).
  • the preferred gel composition may depend on the nucleic acid type and size, the compatibility of additives (e.g., dyes, stains, denaturing solutions, or loading buffers) as well as the anticipate downstream applications (e.g., gel extraction then ligation, PCR, or sequencing).
  • Agarose gels may be simpler for gel extraction than polyacrylamide gels.
  • TAE though not as good a conductor as TBE, may also be better for gel extraction because borate (an enzyme inhibitor) carry-over in the extraction process may inhibit downstream enzymatic reactions.
  • Gels may further comprise a denaturing solution such as SDS (sodium dodecyl sulfate) or urea.
  • SDS sodium dodecyl sulfate
  • Urea may be used, for example, to denature proteins or to separate nucleic acids from potentially bound proteins.
  • Urea may be used to denature secondary structures in DNA.
  • urea may convert dsDNA into ssDNA, or urea may convert a folded ssDNA (for example a hairpin) to a non-folded ssDNA.
  • Urea-polyacrylamide gels (further comprising TBE) may be used for accurately resolving ssDNA.
  • Samples may be incorporate into gels with different formats.
  • gels may contain wells in which samples may be loaded manually.
  • One gel may have multiple wells for running multiple nucleic acids samples.
  • the gels may be attached to microfluidic channels that automatically load the nucleic acid sample(s).
  • Each gel may be downstream of several microfluidic channels, or the gels themselves may each occupy separate microfluidic channels.
  • the dimensions of the gel may affect the sensitivity of nucleic acid detection (or visualization). For example, thin gels or gels inside of microfluidic channels (such as in bioanalyzers or tapestations) may improve the sensitivity of nucleic acid detection.
  • the nucleic acid detection step may be important for selecting and extracting a nucleic acid fragment of the correct size.
  • a ladder may be loaded into a gel for nucleic acid size reference.
  • the ladder may contain markers of different sizes to which the nucleic acid sample may be compared. Different ladders may have different size ranges and resolutions. For example a 50 base ladder may have markers at 50, 100, 150, 200, 250, 300, 350, 400, 450, 500, 550, and 600 bases. Said ladder may be useful for detecting and selecting nucleic acids within the size range of 50 and 600 bases.
  • the ladder may also be used as a standard for estimating the concentration of nucleic acids of different sizes in a sample.
  • Nucleic acid samples and ladders may be mixed with loading buffer to facilitate the gel electrophoresis (or chromatography) process.
  • Loading buffer may contain dyes and markers to help track the migration of the nucleic acids.
  • Loading buffer may further comprise reagents (such as glycerol) that are denser than the running buffer (e.g., TAE or TBE), to ensure that nucleic acid samples sink to the bottom of the sample loading wells (which may be submerged in the running buffer).
  • Loading buffer may further comprise denaturing agents such as SDS or urea.
  • Loading buffer may further comprise reagents for improving the stability of nucleic acids.
  • loading buffer may contain EDTA to protect nucleic acids from nucleases.
  • the gel may comprise a stain that binds the nucleic acid and that may be used to optically detect nucleic acids of different sizes. Stains may be specific for dsDNA, ssDNA, or both. Different stains may be compatible with different gel substances. Some stains may require excitation from a source light (or electromagnetic wave) in order to visualize. The source light may be UV (ultraviolet) or blue light. In some embodiments, stains may be added to the gel prior to electrophoresis. In other embodiments, stains may be added to the gel after electrophoresis. Examples of stains include Ethidium Bromide (EtBr), SYBR Safe, SYBR Gold, silver stain, or methylene blue.
  • EtBr Ethidium Bromide
  • SYBR Safe SYBR Safe
  • SYBR Gold silver stain
  • silver stain or methylene blue.
  • a reliable method for visualizing dsDNA of a certain size may be to use an agarose TAE gel with a SYBR Safe or EtBr stain.
  • a reliable method for visualizing ssDNA of a certain size may be to use a urea-polyacrylamide TBE gel with a methylene blue or silver stain.
  • the migration of nucleic acids through gels may be driven by other methods besides electrophoresis.
  • other methods besides electrophoresis.
  • gravity, centrifugation, vacuums, or pressure may be used to drive nucleic acids through gels so that they may resolve according to their size.
  • Nucleic acids of a certain size may be extracted from gels using a blade or razor to excise the band of gel containing the nucleic acid.
  • Proper optical detection techniques and DNA ladders may be used to ensure that the excision occurs precisely at a certain band and that the excision successfully excludes nucleic acids that may belong to different, undesirable size bands.
  • the gel band may be incubated with buffer to dissolve it, thus releasing the nucleic acids into the buffer solution. Heat or physical agitation may speed the dissolution.
  • the gel band may be incubated in buffer long enough to allow diffusion of the DNA into the buffer solution without requiring gel dissolution.
  • the buffer may then be separated from the remaining solid-phase gel, for example by aspiration or centrifugation.
  • the nucleic acids may then be purified from the solution using standard purification or buffer-exchange techniques, such as phenol-chloroform extraction, ethanol precipitation, magnetic bead capture, and/or silica membrane adsorption, washing, and elution. Nucleic acids may also be concentrated in this step.
  • nucleic acids of a certain size may be separated from a gel by allowing them to run off the gel.
  • Migrating nucleic acids may pass through a basin (or well) either embedded in the gel or at the end of the gel.
  • the migration process may be timed or optically monitored such that when the nucleic acid group of a certain size enters the basin, the sample is collected from the basin. The collection may occur, for example, by aspiration.
  • the nucleic acids may then be purified from the collected solution using standard purification or buffer-exchange techniques, such as phenol-chloroform extraction, ethanol precipitation, magnetic bead capture, and/or silica membrane adsorption, washing, and elution. Nucleic acids may also be concentrated in this step.
  • nucleic acid size selection may include mass-spectrometry or membrane-based filtration.
  • membrane-based filtration nucleic acids are passed through a membrane (for example a silica membrane) that may preferentially bind to either dsDNA, ssDNA, or both.
  • the membrane may be designed to preferentially capture nucleic acids of at least a certain size.
  • membranes may be designed to filter out nucleic acids of less than 20, 30, 40, 50, 70, 90, or more bases. Said membrane-based, size-selection techniques may not be as stringent as gel electrophoresis or chromatography,
  • Affinity-tagged nucleic acids may be used as sequence specific probes for nucleic acid capture.
  • the probe may be designed to complement a target sequence within a pool of nucleic acids. Subsequently, the probe may be incubated with the nucleic acid pool and hybridized to its target.
  • the incubation temperature may be below the melting temperature of the probe to facilitate hybridization.
  • the incubation temperature may be up to 5, 10, 15, 20, 25, or more degrees Celsius below the melting temperature of the probe.
  • the hybridized target may be captured to a solid-phase substrate that specifically binds the affinity tag.
  • the solid-phase substrate may be a membrane, a well, a column, or a bead. Multiple rounds of washing may remove all non-hybridized nucleic acids from the targets.
  • the washing may occur at a temperature below the melting temperature of the probe to facilitate stable immobilization of target sequences during the wash.
  • the washing temperature may be up to 5, 10, 15, 20, 25, or more degrees Celsius below the melting temperature of the probe.
  • a final elution step may recover the nucleic acid targets from the solid phase-substrate, as well as from the affinity tagged probes.
  • the elution step may occur at a temperature above the melting temperature of the probe to facilitate the release of nucleic acid targets into an elution buffer.
  • the elution temperature may be up to 5, 10, 15, 20, 25, or more degrees Celsius above the melting temperature of the probe.
  • the oligonucleotides bound to a solid-phase substrate may be removed from the solid-phase substrate, for example, by exposure to conditions such as acid, base, oxidation, reduction, heat, light, metal ion catalysis, displacement or elimination chemistry, or by enzymatic cleavage.
  • the oligonucleotides may be attached to a solid support through a cleavable linkage moiety.
  • the solid support may be functionalized to provide cleavable linkers for covalent attachment to the targeted oligonucleotides.
  • the linker moiety may be of six or more atoms in length.
  • the cleavable linker may be a TOPS (two oligonucleotides per synthesis) linker, an amino linker, or a photocleavable linker.
  • biotin may be used as an affinity tag that is immobilized by streptavidin on a solid-phase substrate.
  • Biotinylated oligonucleotides for use as nucleic acid capture probes, may be designed and manufactured. Oligonucleotides may be biotinylated on the 5′ or 3′ end. They may also be biotinylated internally on thymine residues. Increased biotin on an oligo may lead to stronger capture on the streptavidin substrate. A biotin on the 3′ end of an oligo may block the oligo from extending during PCR.
  • the biotin tag may be a variant of standard biotin.
  • the biotin variant may be biotin-TEG (triethylene glycol), dual biotin, PC biotin, DesthioBiotin-TEG, and biotin Azide. Dual biotin may increase the biotin-streptavidin affinity.
  • Biotin-TEG attaches the biotin group onto a nucleic acid separated by a TEG linker. This may prevent the biotin from interfering with the function of the nucleic acid probe, for example its hybridization to the target.
  • a nucleic acid biotin linker may also be attached to the probe.
  • the nucleic acid linker may comprise nucleic acid sequences that are not intended to hybridize to the target.
  • the biotinylated nucleic acid probe may be designed with consideration for how well it may hybridize to its target. Nucleic acid probes with higher designed melting temperatures may hybridize to their targets more strongly. Longer nucleic acid probes, as well as probes with higher GC content, may hybridize more strongly due to increased melting temperatures. Nucleic acid probes may have a length of a least 5, 10, 15, 20, 30, 40, 50, or 100 bases, or more. Nucleic acid probes may have a GC content anywhere between 0 and 100%. Care may be taken to ensure that the melting temperature of the probe does not exceed the temperature tolerance of the streptavidin substrate.
  • Nucleic acid probes may be designed to avoid inhibitory secondary structures such as hairpins, homodimers, and heterodimers with off-target nucleic acids. There may be a tradeoff between probe melting temperature and off-target binding. There may be an optimal probe length and GC content at which melting temperature is high and off-target binding is low.
  • a synthetic nucleic acid library may be designed such that its nucleic acids comprise efficient probe binding sites.
  • the solid-phase streptavidin substrate may be magnetic beads.
  • Magnetic beads may be immobilized using a magnetic strip or plate.
  • the magnetic strip or plate may be brought into contact with a container to immobilize the magnetic beads to the container.
  • the magnetic strip or plate may be removed from a container to release the magnetic beads from the container wall into a solution.
  • Beads may have varying sizes. For example beads may be anywhere between 1 and 3 micrometers (um) in diameter. Beads may have a diameter of at most 1, 2, 3, 4, 5, 10, 15, 20, or more micrometers.
  • Bead surfaces may be hydrophobic or hydrophilic. Beads may be coated with blocking proteins, for example BSA. Prior to use, beads may be washed or pre-treated with additives, such as blocking solution to prevent them from non-specifically binding nucleic acids.
  • a biotinylated probe may be coupled to the magnetic streptavidin beads prior to incubation with the nucleic acid sample pool. This process may be referred to as direct capture. Alternatively, the biotinylated probe may be incubated with the nucleic acid sample pool prior to the addition of magnetic streptavidin beads. This process may be referred to as indirect capture. The indirect capture method may improve target yield. Shorter nucleic acid probes may require a shorter amount of time to couple to the magnetic beads.
  • Optimal incubation of the nucleic acid probe with the nucleic acid sample may occur at a temperature that is 1 to 10 degrees Celsius or more below the melting temperature of the probe. Incubation temperatures may be at most 5, 10, 20, 30, 40, 50, 60, 70, 80, or more degrees Celsius.
  • the recommended incubation time may be 1 hour. The incubation time may be at most 1, 5, 10, 20, 30, 60, 90, 120, or more minutes. Longer incubation times may lead to better capture efficiency.
  • An additional 10 minutes of incubation may occur after the addition of the streptavidin beads to allow biotin-streptavidin coupling. This additional time may be at most 1, 5, 10, 20, 30, 60, 90, 120, or more minutes. Incubation may occur in buffered solution with additives such as sodium ion.
  • Hybridization of the probe to its target may be improved if the nucleic acid pool is single-stranded nucleic acid (as opposed to double-stranded).
  • Preparing a ssDNA pool from a dsDNA pool may entail performing linear-PCR with one primer that commonly binds the edge of all nucleic acid sequences in the pool. If the nucleic acid pool is synthetically created or assembled, then this common primer binding site may be included in the synthetic design.
  • the product of the linear-PCR will be ssDNA. More starting ssDNA template for the nucleic acid capture may be generated with more cycles of linear-PCR. See Chemical Methods Section D on PCR.
  • the beads may be immobilized by a magnet and several rounds of washing may occur. Three to five washes may be sufficient to remove non-target nucleic acids, but more or less rounds of washing may be used. Each incremental wash may further decrease non-targeted nucleic acids, but it may also decrease the yield of target nucleic acids.
  • a low incubation temperature may be used. Temperatures as low as 60, 50, 40, 30, 20, 10, or 5 degrees Celsius or less may be used.
  • the washing buffer may comprise Tris buffered solution with sodium ion.
  • Optimal elution of the hybridized targets from the magnetic bead-coupled probes may occur at a temperature that is equivalent to or more than the melting temperature of the probe. Higher temperatures will facilitate the dissociation of the target to the probe. Elution temperatures may be at most 30, 40, 50, 60, 70, 80, or 90 degrees Celsius, or more. Elution incubation time may be at most 1, 2, 5, 10, 30, 60 or more minutes. Typical incubation times may be approximately 5 minutes, but longer incubation times may improve yield.
  • Elution buffer may be water or tris-buffered solution with additives such as EDTA.
  • Nucleic acid capture of target sequences containing at least one or more of a set of distinct sites may be performed in one reaction with multiple distinct probes for each of those sites.
  • Nucleic acid capture of target sequences containing every member of a set of distinct sites may be performed in a series of capture reactions, one reaction for each distinct site using a probe for that particular site. The target yield after a series of capture reactions may be low, but the captured targets may subsequently be amplified with PCR. If the nucleic acid library is synthetically designed, then the targets may be designed with common primer binding sites for PCR.
  • Synthetic nucleic acid libraries may be created or assembled with common probe binding sites for general nucleic acid capture. These common sites may be used to selectively capture fully assembled or potentially fully assembled nucleic acids from assembly reactions, thereby filtering out partially assembled or mis-assembled (or unintended or undesirable) bi-products.
  • the assembly may involve assembling a nucleic acid with a probe binding site on each edge sequence such that only a fully assembled nucleic product would contain the requisite two probe binding sites necessary to pass through a series of two capture reactions using each probe.
  • a partially assembled product may contain neither or only one of the probe sites, and therefore should not ultimately be captured.
  • a mis-assembled (or unintended or undesirable) product may contain neither or only one of the edge sequences.
  • mis-assembled product may not ultimately be captured.
  • common probe binding sites may be included on each component of an assembly.
  • a subsequent series of nucleic acid capture reactions using a probe for each component may isolate only fully assembled product (containing each component) from any bi-products of the assembly reaction.
  • Subsequent PCR may improve target enrichment, and subsequent size-selection may improve target stringency.
  • nucleic acid capture may be used to selectively capture a targeted subset of nucleic acids from a pool. For example, by using probes with binding sites that only appear on said targeted subset of nucleic acids.
  • Synthetic nucleic acid libraries may be created or assembled such that nucleic acids belonging to potential sub-libraries of interest all share common probe binding sites (common within the sub-library but distinct from other sub-libraries) for the selective capture of the sub-library from the more general library.
  • Lyophilization is a dehydration process. Both nucleic acids and enzymes may be lyophilized. Lyophilized substances may have longer lifetimes. Additives such as chemical stabilizers may be used to maintain functional products (e.g., active enzymes) through the lyophilization process. Disaccharides, such as sucrose and trehalose, may be used as chemical stabilizers.
  • sequences of nucleic acids may be designed to avoid synthesis, sequencing, and assembly complications. Moreover, they may be designed to decrease the cost of building the synthetic library and to improve the lifetime over which the synthetic library may be stored.
  • Nucleic acids may be designed to avoid long strings of homopolymers (or repeated base sequences) that may be difficult to synthesize. Nucleic acids may be designed to avoid homopolymers of length greater than 2, 3, 4, 5, 6, 7 or more. Moreover, nucleic acids may be designed to avoid the formation of secondary structures, such as hairpin loops, that may inhibit their synthesis process. For example, predictive software may be used to generate nucleic acid sequences that do not form stable secondary structures. Nucleic acids for building synthetic libraries may be designed to be short. Longer nucleic acids may be more difficult and expensive to synthesize. Longer nucleic acids may also have a higher chance of mutations during synthesis. Nucleic acids (e.g., components) may be at most 5, 10, 15, 20, 25, 30, 40, 50, 60 or more bases.
  • Nucleic acids to become components in an assembly reaction may be designed to facilitate that assembly reaction. See Chemical Methods Section A and B for more information on nucleic acid sequence considerations for OEPCR and ligation-based assembly reactions, respectively. Efficient assembly reactions typically involve hybridization between adjacent components. Sequences may be designed to promote these on-target hybridization events while avoiding potential off-target hybridizations. Nucleic acid base modifications, such as locked nucleic acids (LNAs), may be used to strengthen on-target hybridization. These modified nucleic acids may be used, for example, as staples in staple strand ligation or as sticky ends in sticky-strand ligation.
  • LNAs locked nucleic acids
  • modified bases that may be used for building synthetic nucleic acid libraries (or identifier libraries) include 2,6-Diaminopurine, 5-Bromo dU, deoxyUridine, inverted dT, inverted diDeoxy-T, Dideoxy-C, 5-Methyl dC, deoxylnosine, Super T, Super G, or 5-Nitroindole.
  • Nucleic acids may contain one or multiple of the same or different modified bases.
  • Some of the said modified bases are natural base analogs (for example, 5-Methyl dC and 2,6-Diaminopurine) that have higher melting temperatures and may therefore be useful for facilitating specific hybridization events in assembly reactions.
  • modified bases are universal bases (for example, 5-Nitroindole) that can bind to all natural bases and may therefore be useful for facilitating hybridization with nucleic acids that may have variable sequences within desirable binding sites.
  • these modified bases may be useful in primers (e.g., for PCR) and probes (e.g., for nucleic acid capture) as they may facilitate the specific binding of primers and probes to their target nucleic acids within a pool of nucleic acids. See Chemical Methods Section D and F for more nucleic acid design considerations with regard to nucleic acid amplification (or PCR) and nucleic acid capture, respectively.
  • Nucleic acids may be designed to facilitate sequencing.
  • nucleic acids may be designed to avoid typical sequencing complications such as secondary structure, stretches of homopolymers, repetitive sequences, and sequences with too high or too low of a GC content. Certain sequencers or sequencing methods may be error prone.
  • Nucleic acid sequences (or components) that make up synthetic libraries e.g., identifier libraries
  • Nucleic acid sequences may be designed with hamming distances of at least 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15 or more base mutations.
  • Alternative distance metrics from hamming distance may also be used to define a minimum requisite distance between designed nucleic acids.
  • sequencing methods and instruments may require input nucleic acids to contain particular sequences, such as adapter sequences or primer-binding sites. These sequences may be referred to as “method-specific sequences”.
  • Typical preparatory workflows for said sequencing instruments and methods may involve assembling the method-specific sequences to the nucleic acid libraries.
  • a synthetic nucleic acid library e.g., identifier library
  • these method-specific sequences may be designed into the nucleic acids (e.g., components) that comprise the library (e.g., identifier library).
  • sequencing adapters may be assembled onto the members of a synthetic nucleic acid library in the same reaction step as when the members of a synthetic nucleic acid library are themselves assembled from individual nucleic acid components.
  • Nucleic acids may be designed to avoid sequences that may facilitate DNA damage. For example, sequences containing sites for site-specific nucleases may be avoided. As another example, UVB (ultraviolet-B) light may cause adjacent thymines to form pyrimidine dimers which may then inhibit sequencing and PCR. Therefore, if a synthetic nucleic acid library is intended to be stored in an environment exposed to UVB, then it may be beneficial to design its nucleic acid sequences to avoid adjacent thymines (i.e., TT).
  • TT adjacent thymines
  • Two or more nucleic acid components may be ligated together to create an identifier using either chemical and/or biological ligation methods.
  • chemical ligation methods such as “click chemistry”
  • biological methods such as enzymatic ligation.
  • Click chemistry or Copper-Catalyzed Azide-Alkyne Cycloaddition is a variant of the Huisgen 1,3-dipolar cycloaddition reaction.
  • an alkyne and azide group react to form a triazole phosphodiester mimic.
  • Current methods use Cu(I) ion to increase the specificity, rate, and yield of this reaction.
  • the reaction may be fast with some alkynes reporting reaction completion times of approximately one minute. Reaction times may be 30, 60, 90, 120, 150, or 180 seconds or more.
  • the reaction may also be robust, showing tolerance to a broad pH range.
  • Chemical ligation using click chemistry may occur between two single-stranded nucleic acid components with the help of a template (or staple or splint) oligonucleotide. Alternatively, chemical ligation may also occur between double-stranded nucleic acid components if there is a complementary overhang (or sticky end) in common. Chemical ligation with click chemistry may be used to construct identifiers according to the product scheme ( FIG. 6 ), permutation scheme ( FIG. 11 ), MchooseK scheme ( FIG. 12 ), partition scheme ( FIG. 13 ), or unconstrained string scheme ( FIG. 14 ) described in the preceding.
  • Ligation of components using click chemistry requires one component to have at least one alkyne group and another component to have at least one azide group. Either modification may be placed at the 5′ or 3′ end of one nucleic acid component as long as the complementary modification is placed on the adjacent component such that the 3′ end of one component ligates to the 5′ end of the other.
  • alkyne-azide linkages may be used in click chemistry.
  • Alkyne-azide linkages that are compatible with molecular biology methods, such as PCR, may be particularly well suited for generating identifiers. If a particular pool of identifiers comprises one or more alkyne-azide linkages, then the identifiers may be copied to their natural forms (with phosphodiester bonds between bases) using PCR.
  • each component may have two parts: one longer part intended for hybridizing to nucleic acid probes for data access, and another shorter part intended for sequencing read out.
  • the two parts may be disjoint and intended to assemble onto an identifier at each edge, such that the final identifier product has two functionally different regions. One region on one side intended for chemical access, and one region on the other side intended for sequencing.
  • FIG. 22 gives an example schematic of this concept for sticky end ligation assembly of identifiers, where components from each layer come together according to the product scheme.
  • the first layer nucleates the identifier assembly process with a joint 2-part component, and the subsequent layers comprise disjoint 2-part components that assemble onto the identifier from both edges.
  • the symbols above the sticky ends represent their sequences. Sticky ends with different symbols are orthogonal.
  • An asterisk next to a symbol represents the reverse complement. For example, ‘a’ and ‘a*’ are reverse complements of each other and will therefore hybridize to form a product during ligation.
  • Base editors may be used to programmably mutate bases located at particular loci within a parent identifier to construct new identifiers.
  • a base editor may be a dCas9 protein fused to a cytidine deaminase, which converts Cystosine (C) to Uracil (U).
  • Parent identifiers may be designed with several orthogonal target loci for guide RNAs (gRNAs) to bind.
  • a target locus may contain one or more Cytosines within the activity range of a bound dCas9-deaminase at that locus. The activity range may be 1, 2, 3, 4, 5, 6 or more bases within the locus.
  • a parent identifier with N orthogonal target loci may be programmably converted to 2 N distinct daughter identifier sequences by applying dCas9-deaminase and different subsets of N gRNAs (each targeting a distinct locus on the parent).
  • the combinatorial space of possible identifiers constructed in this scheme may store N bits of information for N gRNA inputs.
  • any given target locus of the parent sequences may contain targeted cytosines on both the top and bottom strand to promote increased mutation efficiency. Moreover, each locus must be adjacent to a PM site for efficient gRNA targeting to occur. However, the PM sequence may vary depending on the use of different engineered Cas9 variants.
  • a dCas9-deaminase fusion may comprise a linker sequence between the two fused proteins.
  • the optimal linker length may be 16 amino acids long for efficient targeted mutations. Linker length may be at least 0, 1, 5, 10, 15, 20, 25 or more amino acids in length.
  • Cytidine deaminases may be used. Examples of Cytidine deaminases include APOBEC1. AID, CDA1, or APOBEC3G.
  • An active Cas9 nickase may be used instead of dCas9, but then it may be necessary to include DNA repair enzymes in the identifier construction reaction as well.
  • an Adenine deaminase fused to dCas9 (as opposed to, or in addition to, a Cytidine deaminase fused to dCas9) may be used to mutate Adenine to Inosine at defined loci of a parent identifier accessible by a gRNA.
  • the Inosine is interpreted as a Guanine by DNA polymerase. Therefore, PCR of a base edited locus may result in a complementary Thymine to Cytosine mutation on the opposite strand.
  • the ability to reliably delete (or erase) data stored using nucleic acids may be beneficial for security, privacy, and regulatory reasons.
  • Erasing data may involve breaking the covalent bonds within nucleic acids, irreversibly modifying nucleic acids to disrupt their ability to be sequenced, encapsulating or adsorbing them in irreversible ways, or adding more nucleic acids or other materials to render the original collection of nucleic acids unreadable or unfeasible to read. These methods may be performed in a selective or non-selective way. The selection process may be separate from the deletion process. For example, starting with an identifier library, sequence specific probes may be used to pull-down subsets of identifiers for deletion. As another example, purification of select identifiers by size or mass-to-charge ratio may be done in conjunction with other selective or non-selective deletion methods.
  • Selective methods for nucleic acid deletion from a library include the use of sequence specific probes to pull-down subsets of nucleic acids for deletion, the use of CRISPR-based methods to cleave select nucleic acids containing one or more target sequences, and the use of purification techniques to select nucleic acids by size or mass-to-charge ratio.
  • Non-selective methods for deleting information-encoding nucleic acids from a library include sonication, autoclaving, treatment with bleach, bases, acids, ethidium bromide or other DNA modification agents, irradiation (for example with ultraviolet light), combustion, and non-specific nuclease digestion (in vitro or in vivo) such as with DNase I.
  • Other methods may be used obfuscate, hide, or physically protect the nucleic acids from access or sequencing.
  • the methods may include encapsulation, dilution, addition of random nucleic acids to obfuscate the original nucleic acids, and addition of other agents that prevent downstream sequencing of the nucleic acids.
  • the data stored in nucleic acids may be obfuscated with amplification by an error-prone polymerase, for example, a polymerase with a lack of proofreading functionality.
  • nucleic acids For data stored in nucleic acids with a defined period of value, it may be beneficial to use methods that automatically delete the data at a specified point in time. For example, data may be scheduled for deletion after a mandatory regulatory period. As another example, data may be scheduled for deletion if it is being transferred and it does not reach its destination on time.
  • scheduled deletion of nucleic acids may involve the use of degradation agents that work at a defined rate or instantly at a specified point in time.
  • scheduled deletion of nucleic acids may involve the use of a nucleic acid capsule or protective casing that degrades over time.
  • nucleic acids may be held at different temperatures or different environments to promote different rates of degradation. For example, high temperatures or high humidity for increased degradation rates.
  • nucleic acids may be converted to less stable forms for faster degradation. For example, DNA may be converted to the less stable RNA.
  • Verification of nucleic acid deletion may be achieved with sequencing, PCR, or quantitative PCR.
  • the systems and methods described herein allow for efficient random access retrieval of any distribution of bits from an encoded and stored information. Fractions of encoded information may be retrieved efficiently if the data is stored with component specific primers used on edge layers (or end sequences) to amplify a targeted subset of identifiers in a library. Efficient access may include reducing the number of PCR steps necessary to retrieve a selected portion of information from stored data. For example, in set of data stored using the methods described herein an identifier may be accessed in less than L/2 sequential PCR steps, where L is the number of layers that comprise identifiers.
  • the identifier architecture and identifier ranking system affect the random access properties of the identifier pool.
  • the rank of an identifier corresponds to the position of the bit that it represents.
  • the identifier rank may be determined lexicographically from the order of each possible component that may appear in each layer, which may be defined strategically. For example, layers on the edges of the identifiers may be assigned a higher priority than layers in the middle of identifiers, so that random access (e.g., with PCR primers that bind the edge layers of the identifiers) will return identifiers with consecutive rankings corresponding to a contiguous or related stretch of encoded bits.
  • a higher “priority” is akin to a lower depth of access—e.g., a high priority element is easier to access than a low priority element.
  • each identifier nucleic acid sequence in the identifier pool corresponds to a symbol value and symbol position within a string of symbols. Further, the presence or absence of an identifier nucleic acid sequence in the pool may be representative of the symbol value of the corresponding respective symbol position within the string of symbols.
  • symbols having contiguous symbol position encode similar digital information.
  • similar digital information may include data of the same structure (i.e., image data or strings of binary code). Similar digital information may also refer to the data contained within the information. For example, all image data locations encoded with a particular intensity of red may be grouped together in contiguous symbol positions. Alternatively, symbols having contiguous symbol positions may not encode similar digital information. For instance, contiguous symbol positions may correspond to various features in the data (i.e., image data) such as an x-coordinate, a y-coordinate, or an intensity value or a range of intensity values. FIG.
  • FIG. 23 shows an example of identifiers produced by the product scheme of three layers, A, B, and C, where each layer has two components, 1 and 2. Components from each of the three layers A, B, and C assemble in that order.
  • the rank of each identifier may be determined by assigning each layer a particular order and then assigning each component within each layer a particular order, and then ordering the identifiers lexicographically.
  • FIG. 23A demonstrates the resulting rank from defining the lexicographical ordering of the layers in the same way that they are ordered in the physical identifier.
  • edges of the identifiers are referred to as “end sequences” or “end molecules.”
  • end sequences or “end molecules.”
  • Each of the bits within a contiguous stretch of bits may be accessed using a probe to hybridize to the target end sequence of each identifier nucleic acid sequence in the plurality of identifier nucleic acid sequences to select identifier nucleic acid sequences which correspond to respective symbols having contiguous symbol positions.
  • FIG. 23B demonstrates how the lexicographical order of layers A, B and C may be changed to enable query of a contiguous stretch of bits with one PCR reaction using primers that bind the edges (or end sequences) of the identifiers.
  • the strategy is not to use the same lexicographical ordering of layers as the physical ordering of layers. Instead, the strategy is to assign a higher priority lexicographical order to layers on the edges (or end sequences) of the identifiers and a lower priority order to layers in the middle of the identifiers.
  • FIG. 24 shows an example of identifiers produced by the product scheme of three layers. A, B, and C, where there is a non-uniform distribution of components across layers. Specifically, two layers have two components, 1 and 2 , and one layer has three components 1 , 2 , and 3 .
  • the lexicographical order of the layers is A, C, then B, even though the physical ordering is A, B, then C.
  • FIG. 24A demonstrates that when more components are placed in the middle layer(s) of an identifier, a PCR query (with primers that each bind an edge component (or end sequence)) may result in a larger pool of accessed identifiers. Correspondingly, more bits may be accessed at a time.
  • FIG. 25 shows an example of identifiers produced by the product scheme of five layers, A, B, C, D, and E, where each layer has two components, 1 and 2 . Furthering the aforementioned identifier ranking principle, the lexicographical order of the layers assigns highest priority to the outermost layers (A and E), next highest priority to the second-to-outermost layers (B and D), and lowest priority to the middle layer (layer C). As used herein, priority refers to the depth (or level) of data access, with high priority corresponding to shallow depth and low priority corresponding to deep depth.
  • a book i.e., layers A and E
  • access of a chapter within the book would be considered the next highest priority (i.e., layers B and D)
  • access of a paragraph within the chapter of the book would be considered the lowest priority (i.e., layer C).
  • the lexicographical ordering of layers would continue in this manner so that fewer PCR queries may be used to retrieve contiguous or related stretches of bits. All identifiers associated with components in the outermost layers (A 1 and E 1 ) may be queried in one PCR reaction.
  • PCR primers may be designed to bind A 1 -B 1 together and E 1 -D 1 together, but neither component on its own, so that the resulting PCR query would access the same identifiers as if A 1 and E 1 followed by B 1 and D 1 were PCR queried sequentially.
  • Multi-bin scheme there are b bins, each holding a disjoint set of identifiers. Each bin is labeled with a unique [log 2 b] bit symbol, which may be referred to herein as a label or bin label.
  • a bitstream of l bits is divided into l/log 2 b “words”, where each word has length [log 2 b] bits. Any word w may be a bin label.
  • the multi-bin scheme may be a “multi-bin positional encoding scheme”.
  • a unique identifier is constructed to denote the position of each word w in the bitstream, and is placed into the unique bin with label w.
  • l/log 2 b identifiers are created to encode l bits of information, and each bit is encoded by exactly one identifier present in exactly one bin. We refer to this as the “multi-bin positional encoding scheme”.
  • the multi-bin positional encoding scheme described above may be described by the following example.
  • Encoding a paragraph of English text is accomplished in the following way. For each symbol x, all occurrences of x are identified in the paragraph. Their integer addresses are obtained by numbering each letter in the text in ascending order. All the identifiers corresponding to the addresses of some specific symbol x are created and collected into a single bin labeled x. Thus, all the locations in the text where x occurs are represented by identifiers in the bin labeled x.
  • FIG. 26 illustrates an example of the multi-bin positional encoding scheme, where the position of each type of symbol in a symbol stream is recorded in a bin reserved for that type of symbol.
  • the figure shows an example phrase “A BEACH CAFÉ” labeled 1 .
  • a nine letter alphabet comprising nine types of symbols “A”, “B”, “C”, “D”, “E”, “F”, “G”, “H”, and “ ” (representing a space).
  • Each symbol in this alphabet is assigned a distinct bin corresponding to the respective symbol and named by that symbol. For example of empty bin “D” is indicated by label 7 .
  • the label of bin “F” is shown by label 6 .
  • a phrase to be encoded is divided into symbols from the alphabet and mapped in one-to-one correspondence with an identifier library, as shown by label 3 .
  • Each occurrence of a symbol triggers the addition of the corresponding identifier to the bin reserved for that symbol.
  • bin A contains three identifiers (label 4 ) because the symbol “A” occurs three times in the phrase to be encoded (“ A BE A CH C A FÉ”, emphasis added).
  • the three identifiers in bin “A” mark the positions of the occurrences of that symbol.
  • Bins “D” and “G” are empty because the letters “B” and “G” do not occur the mapped phrase (“A BEACH CAFÉ”).
  • a bitstream of l bits is encoded implicitly in the distribution of identifiers to b bins labeled 1 , 2 , . . . , b.
  • a mapping is designed between the set of all bitstreams of length l bits and the set of all distributions of d identifiers into b bins.
  • a distribution of d identifiers to b bins is a vector of integer labels (b 1 , b 2 , . . . , b d ) such that 0 ⁇ b 1 ⁇ b: each nonnegative integer b; is the label of the unique bin assigned to the i-th identifier. Since each assigned bin label may be chosen freely from b possible labels, there are b d possible distributions.
  • FIG. 27 illustrates an example of the multi-bin scheme based on the use of identifier distributions for encoding information.
  • FIG. 27 shows an example with an identifier library of two identifiers (labeled 1 ) and a bin collection of three named bins ( 0 , 1 , 2 ). Each row of bins (each row comprising the three named bins 0 , 1 , 2 ) shows an example of a distribution of the two identifiers partitioned into the three bins.
  • the table (labeled 6 ) shows the fixed but arbitrary bitstream mapped to each distribution.
  • the fourth row of three bins shows a distribution in which the two identifiers are placed into the bin named 1 , while the 0 and 2 bins are empty. This distribution is arbitrarily mapped to the bitstream 0011.
  • he second row of three bins shows a distribution in which the two identifiers are placed into bins named 0 and 1 , while the third bin is left empty. This distribution is mapped to the bitstream 0001 (labeled 3 ).
  • the he next row shows a distribution in which the bin named 1 is left empty. This corresponds to the bitstream 0010. Given any such bitstream, its corresponding distribution is constructed, and preserved. In this way, any bitstream may be encoded using this multi-bin identifier distribution scheme, using a sufficient number of bins and identifiers.
  • an identifier may be present in more than one bin.
  • a bitstream of l bits is encoded implicitly in the distribution of identifiers to bins labeled 1 , 2 , . . . , b.
  • each bin contains a subset of identifiers.
  • a mapping is designed between the set of all bitstreams of length l bits and the set of all b-subsets of the set of all identifier subsets.
  • a b-subset we mean a set containing b elements.
  • each bin contains a distinct subset: in this case the scheme can encode a bitstream of length no greater than log 2
  • FIG. 28 illustrates an example of the multi-bin scheme based on the use of identifier distributions for encoding information, where an identifier may appear in more than one bin.
  • This scheme refers to this scheme as Identifier Distributions with Reuse.
  • FIG. 28 shows an example involving an identifier library of two identifiers (labeled 8 and 9 ) and three bins (bins 0 , 1 , 2 ). The two identifiers and three bins are used to code six bits (b 0 b 1 b 2 b 3 b 4 b 5 , wherein each b x corresponds to a single bit in a bitstream and x denotes the position of the respective bit in the bitstream).
  • the top of the figure shows the possible subsets of identifiers corresponding to bits b 0 b 1 (labeled 4 ), b 2 b 3 , and b 4 b 5 , respectively. Any subset of identifiers may be included into any bin.
  • Each bin of the three bins may thus include four options: no identifiers, a single identifier (labeled 8 ), the other identifier (labeled 9 ), or both identifiers ( 8 and 9 ). Since this example involves three bins, each subset is shown thrice, in each row (label 2 ).
  • Each of the three bins may include exactly one subset, but all subset triples are acceptable.
  • each path from left to right corresponds to a collection of subsets to be included in the three bins.
  • Each distribution of identifiers is mapped to a specific bitstream, as shown in the table (labeled 7 ).
  • the bitstream may be inferred by naming the subsets as 00, 01, 10, and 11 for each bin.
  • the distribution shown by label 5 would correspond to the bitstream 000000 because it chooses to include the empty subset of identifiers in each of the three bins, and this subset is named 00.
  • the distribution shown by label 6 would correspond to the bitstream 010110, because it chooses to include subset 01 in bin 0 , subset 01 in bin 1 and subset 10 in bin 2 .
  • the figure shows a few more examples out of the 64 possible distributions (alluded to by the dashed items in the figure).
  • Multi-bin encoding schemes may have applications in secure archival of data because decoding data encoded with such schemes may requires access to and decoding of all bins. For example, to map a multi-bin encoded identifier library back to the source bitstream, it may be necessary to obtain the identifier sets present in each bin because multi-bin schemes map a bitstream to distinct distributions of identifiers in multiple bins making it not possible in general to decode any significant substring of the source bitstream from a proper subset of bins.
  • a source bitstream may be encoded using a multi-bin scheme using multiple orthogonal identifier libraries.
  • the resulting multi-bin libraries may be combined in a way that enables decoding from any subset of bins of some minimum cardinality.
  • a source bitstream may be encoded using five orthogonal libraries and three bins each.
  • the resulting 15 bins may then be combined in a way than enables the decoding of the bitstream from any subset of the three bins.
  • a bin may be a physical location such as a tube, a well, or a spot on a substrate.
  • a bin may be a physical location such as a tube, a well, or a spot on a substrate. In other embodiments a bin may be a more abstract association shared by all identifiers in a collection, such as a particular barcode sequence.
  • FIG. 29 illustrates an embodiment of the integer partition method as outlined by five steps.
  • DNA is depicted as strings comprising grey or black bars and symbols. Each depicted DNA represents a distinct species.
  • a “species” is defined as one or more DNA molecule(s) of the same sequence. If “species” is used in a plural sense, then it may be assumed that every species in the plurality of species has a distinct sequence, though this may sometimes be made explicit by writing “distinct species” instead of “species”.
  • Step 1 of the method embodiment we start with a pool of a very large number of species, each referred to as a “count”.
  • the counts may be designed to have common sequences on the edges (the black and light grey bars) and then distinct sequences in the middle (N . . . N). Degenerate oligonucleotide synthesis strategies may be used to manufacture this starting pool of counts in a rapid and inexpensive manner.
  • Step 2 counts are partitioned to bins (rectangles present in Step 2). It does not matter which count gets partitioned to which bin; all that matters is the number of counts that get partitioned to each bin.
  • Bins are reaction containers.
  • bins may be chambers in a microfluidic channel or positions on a substrate.
  • the counts may be assigned to chambers through microfluidic devices or to positions on a substrate through printing.
  • Each bin contains a distinct DNA species, referred to as a barcode.
  • the barcodes may be designed to have common sequences on the edges (the light and dark grey bars) and distinct sequences in the middle (B 0 , B 1 , B 2 , B 3 , B 4 , . . .
  • Step 3 a common edge sequence of the barcodes assembles to a common edge sequence of the counts.
  • the common edge sequences of the barcodes may be configured to assemble through sticky end ligation or Gibson assembly.
  • Step 5 assembled DNA molecules from each bin are consolidated into a final pool for storage, denoted as Step 5.
  • the species in the final pool contain all of the information about how the counts were partitioned to each bin. This information may be recovered by sequencing.
  • sequencing data may imply that 9 counts were partitioned into 5 bins such that the first bin (B 0 ) has two counts, the second bin (B 1 ) has three counts, the third bin (B 2 ) has one count, the fourth bin (B 3 ) has one count, and the fifth bin (B 4 ) has two counts.
  • This is equivalent to mathematically rewriting the integer “9” as the ordered summation “2+3+1+1+2”, which is known as a “composition”. If the parameters of this method are fixed to always have a total of 9 counts and 5 bins, then the particular composition recorded in this example contains log 2 (13choose4) bits of information since there were 13choose4 possible compositions possible.
  • log 2 13choose4 bits of information since there were 13choose4 possible compositions possible.
  • multiple copies of each species may exist or be created (for example with PCR) without interfering with the information being stored. This enables the final pool to be amplified, both to protect against degradation and to facilitate
  • the method may be implemented to store log 2 [(n+k ⁇ 1)choose(k ⁇ 1)] bits of information.
  • the information measures the number of “weak compositions” of the system.
  • FIG. 30 shows a high level block diagram of an example encoding portion of the codec.
  • the codec Upon receiving a source bitstream and a request to write it to DNA, the codec divides the source bitstream into one or more blocks of size no greater than a fixed length, known as the block size. The codec determines an appropriate block size based on the source bitstream (i.e. string of symbols), processing requirements, and the intended application of the content of the bitstream (i.e. digital information). For example, a 100 Gbit bitstream may be divided into 100 blocks of length 1 Gbit each, or 1000 blocks of length 100 Mbit each, or divided in some other way.
  • the codec may use one or more hashing algorithms to compute a hash of each block. It may append the hash and other metadata, for example, block length and block address, to the block.
  • the codec may apply one or more error detection and correction algorithms to each block and compute one or more error protection bytes.
  • the codec may then combine the original block with the error protection information to obtain an error-protected block.
  • the codec may apply convolution coding to bits in the block and Reed-Solomon or erasure coding to chunks of bytes in the block and append the Reed-Solomon or erasure error protection bytes to each chunk of the block.
  • the codec may append error protection metadata to each block.
  • the codec may choose a specific algebraic field size to conduct error protection calculations.
  • the field size may dictate a source word length, which may be an arbitrary number of bits such as 4, 8, 12, 16, 20, 24, 28, 32, 36, 40, 44, 48, 64, or 128 bits.
  • Source words are contiguous strings of bits (of a fixed length) that comprise the source bitstream.
  • the codec may choose a specific field size and word length based on computational complexity and error protection considerations. For example, an 8-bit word length may be computationally efficient, but a 16-bit word length may offer better error protection.
  • the codec may use a search algorithm to identify an optimal set of parameter values based on one or more objective functions.
  • the codec may use the number of independent reaction compartments within a writer hardware system, or the number of unique identifiers needed to encode a bitstream under a specific configuration of parameter values, or some other function, or some combination of functions, as a cost function.
  • the codec may further apply another encoding step to an error protected block to improve writing or reading performance.
  • the codec may map each word in an error protected block to a new codeword.
  • the codec may use a search algorithm to generate a set of codewords with a specific set of properties. For example, the codec may generate codewords that are of variable lengths, or have the same fixed number of “1” bit values, or codewords that have a specified Hamming distance from each other, or some combination of such features.
  • the codec may use a set of parameters including the source word length, writer hardware speed, and total number of available components, in determining the best codeword length, weight, Hamming distance, or other features of the codewords.
  • the codec may include another layer of error detection or correction information with these codewords.
  • the codec may generate codewords of length n with exactly k “1” bit values where two of the bits, known as the high or low bit, serve as parity bits: the high bit is set when then parity bit is 1, otherwise the low bit is set.
  • One or more pairs of such error protection bits may protect various parts of the codeword.
  • the codec may choose a specific set of codewords to ensure optimized chemical conditions during encoding or decoding. For example, the codec may generate codewords of a fixed weight to ensure that a fixed and identical number of identifiers are assembled in each reaction compartment in a writer system, and in an approximately equal concentration within each compartment and across compartments. The codec may choose codeword length and a partition scheme such that each reaction compartment assembles the same number of identifiers and encodes an integral number of codewords.
  • the codec may choose to encode some or all bits in a source bitstream using multiple sets of identifiers.
  • the identifiers may come from orthogonal identifier libraries or may belong to the same identifier library.
  • the identifiers may encode the source bitstream or combinations of bits from the source bitstream. Using multiple sets of identifiers encoding combinations of bits, the codec may be able to decrease the size of the sample needed to reliably decode all the bits.
  • the codec may produce one or more output blocks for each source block.
  • the output block may describe the set of identifiers to be assembled as a list or some other type of data structure including a tree.
  • the codec may produce one or more command files that command a device to assemble the specified identifiers.
  • the codec may produce command files that control a liquid handling robot or a inkjet printer with inks containing components.
  • the codec may communicate with the device and optimize the block files based on information from the device. For example, the device may report an assembly error rate and the codec may produce new block files that have higher error protection performance.
  • the codec may transmit block files or commands as files or over a network.
  • the codec may execute its computational processes over one or more computers.
  • a Writer may use print-based methods to collocate components for construction of identifiers.
  • Print-based methods may involve the use of one or more printheads, each capable of printing one or more nucleic acid molecules onto a substrate.
  • the identifier library to be assembled is specified and transmitted to the Writer via a set of specification files.
  • a block data file specifies the set of identifiers to be generated by the Writer.
  • the block data file may be compressed using a data compression algorithm.
  • the identifiers comprising a block may be specified in the form of a serialized data structure such as, but not limited to, a tree, a trie, a list, or a bitmap.
  • an identifier library to be generated using the product scheme may be specified with a block metadata file containing the component library partition scheme (the manner in which components are divided into layers in the identifier architecture), and a list of names of the possible components to be used in each layer.
  • the block data file may contain the identifiers to be generated organized as a serialized trie data structure in which each path from the root to the leaf of the trie represents an identifier and each node along the path specifies the component name to be used in that layer of that identifier.
  • the block data file may comprise a serialization of this trie by traversing it in order starting with the root, and visiting the left child node of each node, before visiting the node itself, and then visiting its right child node.
  • FIG. 31 illustrates an embodiment of a data structure and serialization for representing an identifier library.
  • An identifier library encoding some bitstream is shown (label 11 ).
  • Each path from the root of the tree to any leaf represents a single identifier, with the components in the identifier specified by the names of the nodes encountered along the path.
  • Label 6 shows a serialized representation of the data structure primarily comprising component names and delimiters.
  • the serialized form begins with a specification of the constructor-specific partition scheme (label 5 ). In this case, a product construct is used with four layers, containing 3, 2, 3, and 5 components in each of the respective layers. The remaining items in the serialization sketch out paths in the data structure, like the one labeled 1 .
  • the segment labeled 4 in the serialization sketches a path that starts at the root of the tree and descends down node 0 in the first layer, then node 0 in the second layer, node 0 in the third layer, and to the leaf 0 in the last layer. Because the partition scheme has four layers, the algorithm deduces that a complete identifier may be output at this stage. More generally, this segment of the serialization (labeled 7 ) specifies all the alternative components in the final layer. When all the alternatives to be included in the identifier library in a specific layer have been listed, a delimiter (a period in this example) is included in the serialization to mark this state. This triggers the algorithm to ascend up a layer, as shown in the path in the tree (labeled 3 ). The next segment of component identifiers in the serialization (labeled 16 ) describes the next set of identifiers. In this way, an entire identifier library may be represented in a flat serial file in a compact manner.
  • all identifiers are constructed as single stranded nucleic acid molecules (or initially as double stranded nucleic acid molecules and then isolated into single stranded form).
  • an identifier is denoted as a reverse complement of x by x*.
  • S we denote the set of reverse complements of each identifier in S as S*.
  • U the set of all possible single-stranded identifiers in a library, and by U* the set of its reverse complements.
  • U s and U s * we denote a second pair of universe and universe* sets, such that each identifier in these sets is augmented with an additional nucleic acid sequence, known as a search region, that may be targeted or selected by chemical methods.
  • Computation on a given identifier library may be implemented by a sequence of chemical operations, involving hybridization and cleavage. Abstractions of these operations are described below. Each operation takes as an input a pool of identifiers, performs an operation, and returns as an output a pool of identifiers.
  • a first library L 1 and a second library L 2 may each contain eight bits, as shown in the table below.
  • the results of a bit-by-bit “OR” operation between the two libraries and a bit-by-bit “AND” operation between the two libraries are also shown. The details of these operations (and additional operations) performed by chemical steps will be described in further detail below.
  • Each bit of each library is encoded as an identifier including a symbol position.
  • the absence of an identifier for a symbol position indicates a 0 and the presence of an identifier for a symbol position indicates a 1.
  • the identifiers in the libraries are double stranded.
  • the two library pools are combined.
  • the identifiers for both libraries may be left in their double-stranded state for the OR operation. Because an OR operation indicates whether there is a 1 in either L 1 or L 2 , the combination of the two pools is the fully determined OR operation output (as shown above in the OR column). At most, there will be twice as many identifier copies (as compared to the original libraries) for the same symbol position, which will still indicate the presence of a 1 at that symbol position (i.e., at symbol position b 5 ).
  • the double-stranded identifiers may be denatured to generate two single strands (i.e., one sense, or “positive”, strand and one anti-sense, or “negative”, strand for each double stranded identifier).
  • two single strands i.e., one sense, or “positive”, strand and one anti-sense, or “negative”, strand for each double stranded identifier.
  • a subsection of the libraries may be selected, an OR operation may be performed, and the result of the OR operation may replace the existing bit values in one or both of the existing libraries.
  • double-stranded identifiers are first denatured to generate two single strands (i.e., one sense strand and one anti-sense strand for each double stranded identifier). Again, we refer to the resulting two complementary single strands as “positive” and “negative” strands.
  • the positive and negative strands are separated into separate pools. In practice, this may be achieved by using an affinity tagged probe for either the positive or the negative strand (see Chemical Methods Section F on nucleic acid capture).
  • the identifiers may be designed to contain common probe targets for this purpose.
  • the positive strand of the double stranded identifier (e.g., the sense strand) from the first library and the negative strand of the double-stranded identifier (e.g., the anti-sense strand) from the second library are then pooled together, allowing the complementary single strands to hybridize. Assuming there are existing identifiers in both libraries (e.g., in L 1 and L 2 shown in the table above), the resulting combined pool will have a combination of single-strands of DNA and double-strands of DNA after hybridization is allowed to occur. A fully double-stranded identifier indicates that the identifier was present in both the first library L 1 and the second library L 2 .
  • the fully double-stranded identifiers may be selected from the pool to create the AND operation output. For instance, single-stranded identifiers may be selectively removed using a single-strand specific nuclease, such as SI nuclease or Mung Bean nuclease, to cleave the single-stranded identifiers (and partially single-stranded) into small units.
  • a single-strand specific nuclease such as SI nuclease or Mung Bean nuclease
  • the fully double-stranded identifiers, being protected from cleavage may then be isolated using techniques such as the nucleic acid capture techniques described in Chemical Methods Section F or size selection techniques described in Chemical Methods Section E.
  • nucleic acid pool could be run on a chromatography gel such that only the fully complemented double stranded DNA would run at a certain length.
  • the combined pool outputs are shown by the AND column in the table above. Details and additional examples of the steps necessary to perform these AND and OR operations are described below.
  • the random access methods described herein may be used to extract a portion of the library.
  • a subsection of a library may be extracted via random access.
  • a logical operation e.g., OR or AND
  • the resulting set of identifiers may replace the original values of the subsection within the library.
  • the operation single(A) takes a pool of identifiers (double stranded and/or single stranded) and returns only the single stranded nucleic acid identifiers (removing all double stranded identifiers).
  • the operation double(X) takes a pool of identifiers (double stranded and/or single stranded) and returns only the double stranded identifiers (removing all single stranded identifiers).
  • the operations make-single(X) and make-single*(A) converts all double stranded nucleic acid identifiers into their single stranded forms.
  • the operation delete(X, q) deletes all identifiers (double stranded or single stranded) that satisfy query q. Queries may be implemented via random access as described previously.
  • the operation combine(P, Q) returns a pool containing all identifiers in P or Q.
  • assign(X, Y) which assigns the result of Y to the variable name X. For brevity, we also denote this operation in the following form: X-Y. We assume that assignment operations execute under ideal conditions allowing variables to be reused without any “contamination” issues.
  • FIG. 32 illustrates an example setup for computing with identifier libraries.
  • the figure illustrates an example combinatorial space of identifiers drawn as an abstract tree data structure (labeled 4 ).
  • each level of the tree chooses between two components (shown by label 2 ).
  • Each path from the root of the tree corresponds to a unique identifier (as illustrated by the example in label 3 ), and determines its order (or rank).
  • Label 4 shows the single stranded universal identifier library.
  • Label 5 shows a single stranded identifier library that encodes a specific bitstream, called “a” for example.
  • Label 7 shows a sub-bitstream of “a” called “s” comprising seven bits.
  • label 10 shows a sub-bitstream “t” of bitstream “b” of the same length.
  • the sub-bitstreams to be computed on are available in pools P and Q (labeled 6 and 9 respectively) and ready for computation.
  • the operation and(s, t), defined as the bitwise logical conjunction of the bits in bitstreams s and t, may be implemented using the sequence of operations below.
  • bitwise logical negation of the bits in bitstream s may be implemented using the sequence of operations below:
  • the operation or(s, t), defined as the bitwise logical disjunction of bits in bitstreams s and t, may be implemented using the sequence of operations below:
  • the or(s,t) operation may include combining dsA and dsB in a pool to resulting in a combination of identifiers that may be referred to as O (the output of the or(s,t) operation.
  • nand(s, t) defined as the bitwise logical negation of the conjunction of the bits in bitstreams s and t, may be implemented using the sequence of operations below.
  • the operation single(X) may involve first combining X with either U s or U s * so that the single stranded identifiers from X hybridize to the universal identifiers. Moreover, because the universal identifiers in U s and U s * have a special search region, these molecules that hybridize to the universal identifiers may be accessed in a targeted manner.
  • the operation double(X) may involve treating the identifiers in X with a single-stranded specific nuclease, such as SI nuclease, and then running the resulting pool of DNA on a gel to isolate only identifiers that were not cleaved (and hence fully double-stranded).
  • a single-stranded specific nuclease such as SI nuclease
  • FIG. 33 illustrates an example of how logical operations may be performed on bitstreams “s” and “t” encoded by identifier libraries.
  • a universal library labeled 14
  • the column labeled AND/NAND shows how one may compute the conjunction of bitstreams “s” and “t” (labeled 5 and 7 respectively).
  • U or U* the correct universal library
  • the collection of double stranded identifiers in the resulting pool encodes the result of the AND computation: separating out the double stranded products gives an identifier library representation of and(s, t). Alternatively, separating out the single stranded products gives the identifier library representation of nand(s, t).
  • the column labeled OR shows how one may compute the disjunction of bitstreams “s” and “t”. When the pools containing the identifiers representing “s” and “t” are combined, the resulting library contains the representation of or(s, t).
  • the column labeled NOT shows how one may compute the negation of the bitstream “s”.
  • the single stranded identifier library representing the bitstream “s” is combined with the complementary universal identifier library (labeled 15 ).
  • all the double stranded products formed represent the “1” bits in “s” and may be discarded.
  • the remaining single stranded products represent the “0” bits in “s” and thus correspond to the “1” bits in not(s).
  • Image data refers to data that is presented, implicitly or explicitly, as a collection of vectors of some dimension, and has locality properties: the vectors presented have a notion of distance among them, and vectors close together are queried, operated on, or interpreted together. For example, in a photographic image, each pixel is a vector describing the location of the pixel and its color values, and nearby pixels typically form a region of one or more objects in the photograph and are therefore likely to be interpreted and operated on as a unit.
  • an image is mapped to an identifier library with an image encoding scheme where vectors from the original multidimensional image are ordered into a linear ordering defined by a mathematical function such as a space-filling curve.
  • a mathematical function such as a space-filling curve.
  • the possible values along some or all dimensions of the presented vectors may be mapped to specific components in the component library and some or all dimensions of the vectors may be mapped to layers within a product scheme for identifier construction. We refer to this as a native image encoding.
  • a grayscale image x pixels in width and y pixels in height may be mapped to a product scheme for constructing identifiers in which the components in the first layer represent the x-coordinate of a pixel, the components in the second layer represent the y-coordinate of a pixel, and the components in the third layer represent the grayscale intensity of the pixel.
  • an RGB-color image may be represented similarly with three orthogonal identifier libraries, one for each of the red, blue, and green color channels.
  • other alternative color models such as hue-saturation-value may be represented similarly.
  • the coordinates specifying the location of a pixel may be represented as described above, except where the components of the third layer, instead of each specifying an intensity value, each represents a bit position in a bit-string that specifies the intensity value and where the presence or absence of an identifier with each component specifies a value of ‘1’ or ‘0’ respectively.
  • the third layer may comprise 256 components where each component at a particular pixel specifies 1 of 256 possible intensity values
  • the third layer may comprise 8 components where each subset of these components at a particular pixel specifies 1 of 256 possible intensity values.
  • some or all components are associated with a range of values.
  • a component in the color value layer (the third layer) may be defined to represent an interval of color values in that color channel.
  • each component in the third layer of a red channel identifier may be mapped to a red color value range of ⁇ 10 points instead of a specific red color value.
  • any cartesian section (neighborhood of pixels) in the image may be queried for color values using the random access schemes described previously, such as PCR or hybridization capture.
  • the encoding scheme is such that each component in the third layer specifies an intensity value, then any color value may be queried for associated pixel coordinates using the random access schemes.
  • an image encoded with a native image encoding may be decoded at a plurality of resolutions. For example, an image that is x pixels wide and y pixels tall encoded with an RGB color model using approximately 3xy identifiers may be decoded at half the original resolution by sampling a uniformly random subset of half the identifiers. The contents of the original image may be reconstructed at a lower resolution from the sampled identifiers using image processing and interpolation techniques. Because a smaller sample is used in decoding the image, the cost and time of decoding is reduced.
  • low resolution decoding of multiple images and image processing may be used to identify images or sections of images of interest in an archive. This may be followed by high resolution decoding of these images or sections of images. This set of features may be useful, for example, in analyzing a large archive of surveillance images in which a specific visual feature is being sought.
  • a video archive may be treated as a large archive of static image frames.
  • random access and low resolution decoding may identify frames of interest. Then, surrounding frames may be decoded at a higher resolution to reconstruct video segments of interest. In this way, a large image or video archive may be stored at a high density, for many centuries, and still queried in parallel at low cost.
  • An uncompressed image file may be encoded into identifiers such that each identifier or each contiguous group of identifiers represents a pixel of the image. For example, if the image is stored as a bitmap where each bit is a pixel that can have one of two colors (for example white or black), then each bit in the bitmap may be represented by an identifier, and the presence or absence of that identifier may represent one color or the other, respectively.
  • the identifier library may be randomly sampled (as we would expect with standard next generation sequencing technologies). The read-back resolution of the image may be specified by defining the sample size of the read-out.
  • FIG. 34 demonstrates an example image ( FIG. 34 ) of a dog stored as a bitmap.
  • the original image in FIG. 34A is 1476800 pixels (1300 ⁇ 1136 pixels), each stored as a bit (white or black).
  • FIG. 34B demonstrates the resulting image from simulated sampling of 10 ⁇ the total number of identifiers (1318200 sample size). It has similar details as the original image.
  • FIG. 34C demonstrates the resulting image from simulated sampling of an equivalent number to the total number of identifiers (131820 sample size).
  • FIG. 34D demonstrates the resulting image from simulated sampling of 10 ⁇ less identifiers than the total number of identifiers (13182 sample size). Because the black pixels are so sparse, it is difficult to visualize the image. We may amplify the size of each dark pixel to help re-create the original.
  • FIG. 34E shows the same image except with each black pixel amplified to 25 pixels. At this resolution some detail of the original image may be lost, for example, the strokes of fur. But more coarse details are still visible, for example, the eyes and nose.
  • FIG. 34F demonstrates the resulting image from simulated sampling of 100 ⁇ less identifiers than the total number of identifiers (1318 sample size). Because the black pixels are so sparse, it is difficult to visualize the image.
  • FIG. 34G shows the same image except with each black pixel amplified to 25 pixels. Although many details of the original image may have been lost, the image still shows the shape of the dog as well as some details about its color pattern.
  • An equivalent multi-resolution read-back may be performed even if each pixel of an image has more than two possible colors. For example, if each pixel has 256 possible colors instead of two, then each pixel may be represented by a subset of 8 identifiers. If each pixel has three color channels, for example RGB, each of 256 possible intensities, then the image may be stored with three orthogonal identifier libraries corresponding to each channel.
  • the ability to generate and store random bitstreams using DNA may have applications in computations in cryptography and combinatorial algorithms.
  • Many encryption algorithms for example Data Encryption Standard (DES), require the use of random bits to guarantee security.
  • Other encryption algorithms for example Advanced Encryption Standard (AES), require the use of cryptographic keys.
  • these random bits and keys are generated using a secure source of randomness, because any systematic patterns or biases in the random bits or the keys may be exploited to attack and break encrypted messages.
  • the keys used to encrypt are typically required to be archived for decryption.
  • the strength of the security of encryption methods is dependent on the length of the key used in the algorithm: generally the longer the key, the stronger the encryption. Methods like one-time-pads are one of the most secure encryption methods, but find limited application due to their lengthy key requirement.
  • a nucleic acid library may be generated in which each nucleic acid molecule satisfies the following design: it has a length of n bases with a variable region of k ⁇ n bases. The bases in the variable region are allowed to be chosen at random during the construction of the library. For example, n may be 100 and k may be 80; thus, a library of size 1050 different molecules may potentially be generated. A random sample of such a library, of size 1000 molecules for example, may be sequenced to obtain up to 1000-bit random keys which may be used for encryption.
  • nucleic acid keys (nucleic acid molecules representing keys) described above may be attached to identifiers yielding an ordered collection of key sets.
  • the ordered key sets may be used to synchronize the order in which keys are used by various parties in an encryption context.
  • an identifier library may be constructed combinatorially using a product scheme to obtain 10 12 unique identifiers.
  • each identifier may be collocated with a nucleic acid key, and assembled to form a nucleic acid sample comprising a unique identifier and a random key. Because the identifiers in the identifier library are ordered, keys may now be ordered and accessed and sequenced in any specified order.
  • keys attached to identifiers may be used to instantiate a random function that maps an input identifier to a string of random bits.
  • Such random functions may be useful in applications that require functions that are easy to compute the value of but difficult to invert from a given value, such as hashing.
  • a library of keys, each assembled with a unique identifier is used as the random function.
  • the identifier is accessed from the key library using random access methods, such as hybridization capture or PCR.
  • the identifier is attached to a key comprising sequences of random bases. This key is sequenced and translated into a string of bits and is used as the output of the random function.
  • nucleic acid molecular libraries may be cheaply and quickly copied, and because they may be covertly transported in small volumes
  • nucleic acid key sets generated as described above may be useful in contexts where a large number of encryption keys must be periodically distributed in a secure and covert way among multiple parties that are not geographically collocated.
  • the keys may be reliably archived for extremely long periods of time enabling the secure storage of encrypted archived data.
  • FIGS. 35-38 illustrate embodiments of methods for creating, storing, accessing, and using random or encrypted data stored in DNA.
  • DNA is depicted as strings comprising grey and black bars and symbols. Each depicted DNA represents a distinct species.
  • a “species” is defined as one or more DNA molecule(s) of the same sequence. If “species” is used in a plural sense, then it may be assumed that every species in the plurality of species has a distinct sequence, though sometimes this is made explicit by writing “distinct species instead of “species”.
  • FIG. 35 depicts an example of an entropy (or random data) generator using a large combinatorial space of DNA and a sequencer.
  • the method begins with a random pool of DNA species, referred to as a seed.
  • the seed should ideally contain a uniform distribution of every species of a defined combinatorial set of DNA, for example, all DNA species with 50 bases (with 4 50 members).
  • the full combinatorial space may be too large for every member to be represented in the seed, and so it is permissible that the seed contain a random subset of the combinatorial space instead of the entire combinatorial space.
  • the seed species may be designed to have common sequences on the edges (the black and light grey bars) and then distinct sequences in the middle (N . . . N).
  • oligonucleotide synthesis strategies may be used to manufacture this starting seed in a rapid and inexpensive manner.
  • the common edge sequences may enable amplification of the seed with PCR or compatibility with certain read-out (or sequencing) methods.
  • combinatorial DNA assembly (multiplexed in one reaction) may also be used to rapidly and inexpensively generate a seed.
  • the sequencer randomly samples species from the seed, and it does so in a random order. Because there is uncertainty in the species being read by the sequencer at any given time, the system may be classified as an entropy generator, and it may be used to generate random numbers or random streams of data, for example, as encryption keys.
  • FIG. 36A illustrates an example schematic of a method for storing randomly generated data in DNA. It begins with (1) a large random pool of DNA species, referred to as a seed.
  • the seed should ideally contain a uniform distribution of every species of a defined combinatorial set of DNA, for example, all DNA species with 50 bases (with 4 50 members). However, the full combinatorial space may be too large for every member to be represented in the seed, and so it is permissible that the seed contain a random subset of the combinatorial space.
  • the seed may itself be generated from degenerate oligonucleotide synthesis or combinatorial DNA assembly.
  • Random data (or entropy) is generated by taking random subset of the species in the seed.
  • this may be accomplished by taking a proportional, fractional volume of the seed solution. For example, if the seed solution consists of an estimated 1 million species per microliter (uL), then a random subset of approximately 1 thousand species may be selected by taking a 1 nanoliter (nL) aliquot from the seed solution (assuming it is well-mixed). Alternatively, a subset may be selected by flowing an aliquot of the seed solution through a nanopore membrane and collecting the species only that pass the membrane. Counting the number of species that pass through the membrane may be achieved by measuring the voltage difference across the nanopores. This process may continue until a desirable number of signatures is detected (for example 100, 1000, 10000, or more species signatures).
  • a desirable number of signatures for example 100, 1000, 10000, or more species signatures.
  • single species may be isolated in small droplets (for example, with oil emulsions).
  • the small droplets with single species may be detected by a fluorescent signature and sorted by a series of microfluidic channels into a collection chamber.
  • each selected species as an identifier and, further, we may refer to the full subset of species selected as the “random identifier library” or RIL.
  • RIL Random identifier library
  • the RIL may be amplified with PCR primers that bind to common sequences on the ends of the species.
  • the RIL may be sequenced.
  • True identifiers may be defined by the species in the sample with enrichment above a defined noise threshold.
  • extra error checking and error correction species may be added to the RIL.
  • integer DNA that contains information on how many identifiers to expect (for example a checksum or a parity check) may be added to the RIL.
  • the integer DNA may allow one to know how deeply to sequence the RIL in order to recover all of the information.
  • a RIL may be barcoded with a unique DNA tag. Several barcoded RILs may then be pooled together such that any given RIL may be individually accessed with a hybridization assay (or PCR) against its unique DNA tag.
  • the unique DNA tags may be combinatorially assembled or synthesized and then assembled onto their corresponding RILs.
  • FIG. 36C also shows an example RIL comprising 4 species each containing one hundred random bases.
  • the relative order may be defined by a lexicographical ordering of the 10-base strings based on a defined ordering of the 4 bases (similar to the way in which words in the English language are ordered according to the order of letters in the alphabet). This method for assigning information to a RIL may be computationally faster to map to a binary string than the method described in FIG. 36B .
  • FIG. 37A demonstrates a different method for creating input-output mappings between nucleic acid probes and random data strings where the barcodes (for accessing the data) are generated randomly along with the random data itself.
  • the barcode may be a pair of short sequences of DNA that may appear on both edges of one or multiple species.
  • a barcode associated with a RIL of 100 species may contain up to log 2 (4 25 choose100) ⁇ 4475 bits of information.
  • FIG. 37B demonstrates an implementation of a scheme for accessing and reading stored random data from a pool of barcoded RILs.
  • the sequencer (or reader) may further comprise a function to manipulate the sequence data prior to returning the output.
  • a hash function for example, may make it difficult to use the output data string to perform a reverse chemical query and find its inputs. This functionality may be useful, for example, if the inputs are keys or credentials used for authentication.
  • the method of generating and storing query-able (or accessible) random strings of data may be particularly useful for generating and archiving encryption keys (generated from the random data strings).
  • Each input may be used to access a different encryption key.
  • each input may correspond to a particular user, time range, and/or project in a private archival database.
  • the encrypted data in the private archival database (potentially amounting to a very large amount of data) may be stored in conventional medium by an archival service provider while the encryption keys may be stored in DNA by the owner.
  • the potential latency and sophistication required to perform the chemical access protocol for a particular input may heighten the security barrier of the encryption method against hacking.
  • FIG. 38 illustrates an example system for securing and authenticating access to an artifact.
  • the system requires a physical key comprising a particular combination of species of DNA taken from a large pool of possible species.
  • a target combination of species also referred to as an “identifier key”
  • a reader or sequencer with a built-in lock verifies a matching identifier key and enables access to an artifact.
  • the reader may behave as a credential-token system where, instead of directly unlocking access to an artifact, it returns a token that may be used to access the artifact.
  • the token may be generated, for example, by a built-in hashing function within the reader.
  • Identifier libraries dissolved in solvent may be sprayed, spread, dispensed, or injected into or on physical objects to tag them with information.
  • an unique identifier library may be used to tag distinct instances of a type of object.
  • An identifier library tag on an object may act as a unique barcode, or it may contain more sophisticated information such as a product number, a manufacturing or shipping date, a location of origin, or any other information pertaining to the history of the object, for example a transaction list of previous owners.
  • a primary advantage of using identifiers to tag objects is that the identifiers are undetectable, durable, and well suited to tag a vast number of object instances individually.
  • one or more physical locations may each be tagged with unique identifiers from an identifier library.
  • physical sites A, B, and C may be ubiquitously tagged with an identifier library.
  • An entity for example, a vehicle, person, or any other object, that visits site A or comes in contact with site A may, intentionally or not, pick up a sample of the identifier library. Later upon accessing the entity, the sample may be gathered from the entity and chemically processed and decoded to identify which site was visited by the entity. An entity may visit more than one site and may pick up more than one sample.
  • a similar process may be used to identify some or all the sites visited by the entity if the identifier libraries are disjoint.
  • Such a scheme may have an application in covert tracking of entities.
  • an identifier library may tag an entity.
  • the entity may leave samples of the injected identifiers in sites that it visits. These samples may be gathered, processed and decoded to identify which entities may have visited a site.
  • Those amino acid chains may represent either peptides or proteins.
  • the DNA fragments for assembly may comprise codon sequences.
  • the junctions along which fragments assemble may be functionally or structurally inert codons that will be common to all members of the combinatorial library. Alternatively, the junctions along which fragments assemble may be introns that are eventually removed from messenger RNA which is later translated into the processed peptide chain. Certain fragments may not be codons, but rather barcode sequences that (in combination with other assembled barcodes) uniquely tag each combinatorial string of codons.
  • the assembled products may be pooled together and encapsulated in droplets for in vitro expression assays, or pooled together and transformed into cells for in vivo expression assays.
  • the assays may have a fluorescent output such that the droplets/cells may be sorted into bins by fluorescent strength and subsequently their DNA barcodes sequenced for the purpose of correlating each codon string with a particular output.
  • RNAs may represent combinations of microRNAs or CRISPR gRNAs.
  • Either pooled in vitro or in vivo RNA expression assays may be performed as described above with either droplets or cells, and with barcodes to keep track of which droplets or cells contain which RNA sequence.
  • some pooled assays may be done outside droplets or cells if the output itself is RNA sequencing data. Examples of such pooled assays include RNA aptamer screening and testing (for example, SELEX).
  • we may create a library of combinatorial DNA that encodes for genes in a metabolic pathway.
  • Each DNA fragment may contain a gene expression construct.
  • the junctions along which fragments are assembled may represent inert DNA sequences in between genes.
  • Either pooled in vitro or in vivo gene pathway expression assays may be performed as described above with either droplets or cells, and with barcodes to keep track of which droplets or cells contain which gene pathways.
  • gene regulatory elements include 5′ untranslated regions (UTRs), ribosome binding sites (RBSs), introns, exons, promoters, terminators, and transcription factor (TF) binding sites.
  • UTRs 5′ untranslated regions
  • RBSs ribosome binding sites
  • TF transcription factor binding sites
  • a library of combinatorial DNA aptamers may be created. Assays can be performed to test the ability of the DNA aptamers to bind ligands.
  • Data to be encoded is a textfile containing a poem.
  • the data is encoded manually with pipettes to mix together DNA components from two layers of 96 components to construct identifiers using the product scheme implemented with overlap extension PCR.
  • the first layer, X comprises 96 total DNA components.
  • the second layer, Y also comprises 96 total components.
  • the data Prior to writing the DNA, the data is mapped to binary and then recoded to a uniform weight format where every contiguous (adjacent disjoint) string of 61 bits of the original data is translated to a 96 bit string with exactly 17 bit-values of 1. This uniform weight format may have natural error checking qualities.
  • the data is then hashed into a 96 by 96 table to form a reference map.
  • the middle panel of FIG. 18A shows the two-dimensional reference map of a 96 by 96 table encoding the poem into a plurality of identifiers. Dark points correspond to a ‘1’ bit-value and white points corresponded to a ‘0’ bit-value.
  • the data is encoded into identifiers using two layers of 96 components. Each X value and Y value of the table is assigned a component and the X and Y components are assembled into an identifier using overlap extension PCR for each (X,Y) coordinate with a ‘1’ value.
  • the data was read back (e.g., decoded) by sequencing the identifier library to determine the presence or absence of each possible (X,Y) assembly.
  • FIG. 18A shows a two-dimensional heat map of the abundances of sequences present in the identifier library as determined by sequencing.
  • Each pixel represents a molecule comprising the corresponding X and Y components, and the greyscale intensity at that pixel represents the relative abundance of that molecule compared to other molecules.
  • Identifiers are taken as the top 17 most abundant (X, Y) assemblies in each row (as the uniform weight encoding guarantees that each contiguous string of 96 bits may have exactly 17 ‘1’ values, and hence 17 corresponding identifiers).
  • Data to be encoded is a textfile of three poems totaling 62824 bits.
  • the data is encoded using a Labcyte Echo® Liquid Handler to mix together DNA components from two layers of 384 components to construct identifiers using the product scheme implemented with overlap extension PCR.
  • the first layer, X comprises 384 total DNA components.
  • the second layer, Y also comprises 384 total components.
  • the data Prior to writing the DNA, the data is mapped to binary and then recoded to decrease the weight (number of bit-values of ‘1’) and include checksums.
  • the checksums are established so that there is an identifier that corresponds to a checksum for every contiguous string of 192 bits of data.
  • the re-coded data has a weight of approximately 10,100, which corresponds to the number of identifiers to be constructed.
  • the data may then be hashed into a 384 by 384 table to form a reference map.
  • the middle panel of FIG. 18B shows a two-dimensional reference map of a 384 by 384 table encoding the textfile into a plurality of identifiers.
  • Each coordinate (X,Y) corresponds to the bit of data at position X+(Y ⁇ 1)*192.
  • Black points correspond to a bit value of ‘ i’ and white points correspond to a bit value of ‘0’.
  • the black points on the right side of the figure are the checksums and the pattern of black points on the top of the figure is the codebook (e.g., dictionary for de-coding the data).
  • Each X value and Y value of the table may be assigned a component and the X and Y components are assembled into an identifier using overlap extension PCR for each (X, Y) coordinate with a ‘1’ value.
  • the data was read back (e.g., decoded) by sequencing the identifier library to determine the presence or absence of each possible (X, Y) assembly.
  • the right panel of FIG. 18B shows a two-dimensional heat map of the abundances of sequences present in the identifier library as determined by sequencing.
  • Each pixel represents a molecule comprising the corresponding X and Y components, and the greyscale intensity at that pixel represents the relative abundance of that molecule compared to other molecules.
  • Identifiers are taken as the top S most abundant (X, Y) assemblies in each row, where S for each row may be the checksum value.
  • aspects of the subject matter and the functional operations described in this specification can be implemented in digital electronic circuitry, or in computer software, firmware, or hardware, including the structures disclosed in this specification and their structural equivalents, or in combinations of one or more of them.
  • aspects of the subject matter described in this specification can be implemented as one or more computer program products, i.e., one or more modules of computer program instructions encoded on a computer readable medium for execution by, or to control the operation of, data processing apparatus.
  • the computer readable medium can be a machine-readable storage device, a machine-readable storage substrate, a memory device, a composition of matter affecting a machine-readable propagated signal, or a combination of one or more of them.
  • data processing apparatus encompasses all apparatus, devices, and machines for processing data, including by way of example a programmable processor, a computer, or multiple processors or computers.
  • the apparatus can include, in addition to hardware, code that creates an execution environment for the computer program in question, e.g., code that constitutes processor firmware, a protocol stack, a database management system, an operating system, or a combination of one or more of them.
  • a propagated signal is an artificially generated signal, e.g., a machine-generated electrical, optical, or electromagnetic signal that is generated to encode information for transmission to suitable receiver apparatus.
  • a computer program (also known as a program, software, software application, script, or code) can be written in any form of programming language, including compiled or interpreted languages, and it can be deployed in any form, including as a stand-alone program or as a module, component, subroutine, or other unit suitable for use in a computing environment.
  • a computer program may correspond to a file in a file system.
  • a program can be stored in a portion of a file that holds other programs or data (e.g., one or more scripts stored in a markup language document), in a single file dedicated to the program in question, or in multiple coordinated files (e.g., files that store one or more modules, sub programs, or portions of code).
  • a computer program can be deployed to be executed on one computer or on multiple computers that are located at one site or distributed across multiple sites and interconnected by a communication network.
  • the processes and logic flows described in this specification can be performed by one or more programmable processors executing one or more computer programs to perform functions by operating on input data and generating output.
  • the processes and logic flows can also be performed by, and apparatus can also be implemented as, special purpose logic circuitry, e.g., an FPGA (field programmable gate array) or an ASIC (application specific integrated circuit).
  • processors suitable for the execution of a computer program include, by way of example, both general and special purpose microprocessors, and any one or more processors of any kind of digital computer.
  • a processor will receive instructions and data from a read-only memory or a random access memory or both.
  • the essential elements of a computer are a processor for performing instructions and one or more memory devices for storing instructions and data.
  • a computer will also include, or be operatively coupled to receive data from or transfer data to, or both, one or more mass storage devices for storing data, e.g., magnetic, magneto optical disks, or optical disks.
  • mass storage devices for storing data, e.g., magnetic, magneto optical disks, or optical disks.
  • a computer need not have such devices.

Landscapes

  • Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Theoretical Computer Science (AREA)
  • Biophysics (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Evolutionary Biology (AREA)
  • General Health & Medical Sciences (AREA)
  • Spectroscopy & Molecular Physics (AREA)
  • Biotechnology (AREA)
  • Medical Informatics (AREA)
  • Molecular Biology (AREA)
  • Genetics & Genomics (AREA)
  • Bioethics (AREA)
  • Chemical & Material Sciences (AREA)
  • Databases & Information Systems (AREA)
  • Analytical Chemistry (AREA)
  • Proteomics, Peptides & Aminoacids (AREA)
  • Artificial Intelligence (AREA)
  • General Physics & Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • Evolutionary Computation (AREA)
  • Biomedical Technology (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computational Linguistics (AREA)
  • Mathematical Physics (AREA)
  • Software Systems (AREA)
  • Chemical Kinetics & Catalysis (AREA)
  • Measuring Or Testing Involving Enzymes Or Micro-Organisms (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Probability & Statistics with Applications (AREA)
US16/414,758 2018-05-16 2019-05-16 Compositions and methods for nucleic acid-based data storage Pending US20200193301A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US16/414,758 US20200193301A1 (en) 2018-05-16 2019-05-16 Compositions and methods for nucleic acid-based data storage
US17/206,803 US11227219B2 (en) 2018-05-16 2021-03-19 Compositions and methods for nucleic acid-based data storage

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US201862672495P 2018-05-16 2018-05-16
US16/414,758 US20200193301A1 (en) 2018-05-16 2019-05-16 Compositions and methods for nucleic acid-based data storage

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US17/206,803 Continuation US11227219B2 (en) 2018-05-16 2021-03-19 Compositions and methods for nucleic acid-based data storage

Publications (1)

Publication Number Publication Date
US20200193301A1 true US20200193301A1 (en) 2020-06-18

Family

ID=66770581

Family Applications (2)

Application Number Title Priority Date Filing Date
US16/414,758 Pending US20200193301A1 (en) 2018-05-16 2019-05-16 Compositions and methods for nucleic acid-based data storage
US17/206,803 Active US11227219B2 (en) 2018-05-16 2021-03-19 Compositions and methods for nucleic acid-based data storage

Family Applications After (1)

Application Number Title Priority Date Filing Date
US17/206,803 Active US11227219B2 (en) 2018-05-16 2021-03-19 Compositions and methods for nucleic acid-based data storage

Country Status (7)

Country Link
US (2) US20200193301A1 (fr)
EP (1) EP3794598A1 (fr)
JP (1) JP2021524229A (fr)
KR (1) KR20210029147A (fr)
AU (1) AU2019270159A1 (fr)
CA (1) CA3100529A1 (fr)
WO (1) WO2019222561A1 (fr)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20210049491A1 (en) * 2019-08-12 2021-02-18 International Business Machines Corporation Qubit sensory representation
WO2021072398A1 (fr) 2019-10-11 2021-04-15 Catalog Technologies, Inc. Sécurité et authentification par acide nucléique
WO2021231493A1 (fr) 2020-05-11 2021-11-18 Catalog Technologies, Inc. Programmes et fonctions dans un stockage de données à base d'adn
US20210391033A1 (en) * 2020-06-15 2021-12-16 Life Technologies Corporation Smart qPCR
US11249941B2 (en) * 2018-12-21 2022-02-15 Palo Alto Research Center Incorporated Exabyte-scale data storage using sequence-controlled polymers
WO2022055885A1 (fr) * 2020-09-08 2022-03-17 Catalog Technologies, Inc. Systèmes et procédés d'écriture par séquençage d'acides nucléiques
US11286479B2 (en) 2018-03-16 2022-03-29 Catalog Technologies, Inc. Chemical methods for nucleic acid-based data storage
WO2022066637A1 (fr) 2020-09-22 2022-03-31 Catalog Technologies, Inc. Système de réactions fluidiques à température régulée
US11379729B2 (en) 2016-11-16 2022-07-05 Catalog Technologies, Inc. Nucleic acid-based data storage
US11610651B2 (en) 2019-05-09 2023-03-21 Catalog Technologies, Inc. Data structures and operations for searching, computing, and indexing in DNA-based data storage
US11763169B2 (en) 2016-11-16 2023-09-19 Catalog Technologies, Inc. Systems for nucleic acid-based data storage
WO2024132107A1 (fr) * 2022-12-20 2024-06-27 Ribbon Biolabs Gmbh Ligature d'oligonucléotides
WO2024163733A1 (fr) * 2023-02-01 2024-08-08 Twist Bioscience Corporation Synthèse électrochimique avec nucléotides stables â l'oxydoréduction

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20230324822A1 (en) * 2020-08-25 2023-10-12 North Carolina State University Solid phase transfers of dna and other reagents
CA3239214A1 (fr) * 2021-11-19 2023-05-23 Catalog Technologies, Inc. Stockage d'acide nucleique pour chaine de blocs et jetons non fongibles
WO2023195822A1 (fr) * 2022-04-08 2023-10-12 Seegene, Inc. Procédé de fourniture d'interface utilisateur et dispositif associé
CN116030895A (zh) * 2022-12-13 2023-04-28 中国科学院深圳先进技术研究院 一种基于天然和非天然碱基的dna信息存储方法
WO2024144641A1 (fr) * 2022-12-29 2024-07-04 Gazi Universitesi Rektorlugu Kit de purification d'adn et procédé de fonctionnement de ce kit

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012058638A2 (fr) * 2010-10-29 2012-05-03 President And Fellows Of Harvard College Sondes code à barres à nanostructure d'acide nucléique
US20130253839A1 (en) * 2012-03-23 2013-09-26 International Business Machines Corporation Surprisal data reduction of genetic data for transmission, storage, and analysis
WO2018102064A1 (fr) * 2016-11-30 2018-06-07 Microsoft Technology Licensing, Llc. Système de stockage d'adn à accès aléatoire par l'intermédiaire d'une ligature

Family Cites Families (128)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050032048A1 (en) 1988-05-03 2005-02-10 Oxford Gene Technology Limited Analyzing polynucleotide sequences
US6030657A (en) 1994-11-01 2000-02-29 Dna Technologies, Inc. Labeling technique for countering product diversion and product counterfeiting
EP0970101A2 (fr) 1997-03-20 2000-01-12 University Of Washington Solvant destine a la synthese de biopolymeres, microgouttelettes de solvant et procedes d'utilisation
US6419883B1 (en) 1998-01-16 2002-07-16 University Of Washington Chemical synthesis using solvent microdroplets
AU6846698A (en) 1997-04-01 1998-10-22 Glaxo Group Limited Method of nucleic acid amplification
US6537747B1 (en) 1998-02-03 2003-03-25 Lucent Technologies Inc. Data transmission using DNA oligomers
US6187537B1 (en) 1998-04-27 2001-02-13 Donald E. Zinn, Jr. Process and apparatus for forming a dry DNA transfer film, a transfer film product formed thereby and an analyzing process using the same
US6458583B1 (en) 1998-09-09 2002-10-01 Agilent Technologies, Inc. Method and apparatus for making nucleic acid arrays
US6309828B1 (en) 1998-11-18 2001-10-30 Agilent Technologies, Inc. Method and apparatus for fabricating replicate arrays of nucleic acid molecules
US6221653B1 (en) 1999-04-27 2001-04-24 Agilent Technologies, Inc. Method of performing array-based hybridization assays using thermal inkjet deposition of sample fluids
US7501245B2 (en) 1999-06-28 2009-03-10 Helicos Biosciences Corp. Methods and apparatuses for analyzing polynucleotide sequences
US6446642B1 (en) 1999-11-22 2002-09-10 Agilent Technologies, Inc. Method and apparatus to clean an inkjet reagent deposition device
CN100404692C (zh) 2001-05-11 2008-07-23 松下电器产业株式会社 生物分子基底,使用它的检验和诊断方法及装置
WO2003025123A2 (fr) 2001-08-28 2003-03-27 Mount Sinai School Of Medecine L'adn comme moyen de stockage d'informations a long terme
CA2461413A1 (fr) 2001-09-25 2003-04-03 Kabushiki Kaisha Dnaform Materiaux imprimes comprenant un support recouvert d'un oligomere et/ou d'un polymere, leur procede de preparation et leur procede de distribution et/ou de stockage
US7361310B1 (en) 2001-11-30 2008-04-22 Northwestern University Direct write nanolithographic deposition of nucleic acids from nanoscopic tips
US20030116630A1 (en) 2001-12-21 2003-06-26 Kba-Giori S.A. Encrypted biometric encoded security documents
US6773888B2 (en) 2002-04-08 2004-08-10 Affymetrix, Inc. Photoactivatable silane compounds and methods for their synthesis and use
AU2003245322A1 (en) 2002-05-29 2003-12-19 Arizona Board Of Regents, Acting On Behalf Of Arizona State University Nanoscale ink-jet printing
US20040043390A1 (en) 2002-07-18 2004-03-04 Asat Ag Applied Science & Technology Use of nucleotide sequences as carrier of cultural information
US8071168B2 (en) 2002-08-26 2011-12-06 Nanoink, Inc. Micrometric direct-write methods for patterning conductive material and applications to flat panel display repair
US7491422B2 (en) 2002-10-21 2009-02-17 Nanoink, Inc. Direct-write nanolithography method of transporting ink with an elastomeric polymer coated nanoscopic tip to form a structure having internal hollows on a substrate
DE10308931A1 (de) 2003-02-28 2004-09-23 Apibio Sas System und Verfahren zur Synthese von Polymeren
US6943417B2 (en) 2003-05-01 2005-09-13 Clemson University DNA-based memory device and method of reading and writing same
JP2005080523A (ja) * 2003-09-05 2005-03-31 Sony Corp 生体遺伝子に導入するdna、遺伝子導入ベクター、細胞、生体遺伝子への情報導入方法、情報処理装置および方法、記録媒体、並びにプログラム
US9317664B2 (en) 2003-10-14 2016-04-19 Verseon Corporation Method and device for partitioning a molecule
US20050239102A1 (en) 2003-10-31 2005-10-27 Verdine Gregory L Nucleic acid binding oligonucleotides
DE102005012567B4 (de) 2005-03-04 2008-09-04 Identif Gmbh Markierungslösung, deren Verwendung und Verfahren zu ihrer Herstellung
US7600840B2 (en) 2005-08-12 2009-10-13 Samsung Electronics Co., Ltd. Device for printing droplet or ink on substrate or paper
JP2009513952A (ja) 2005-10-07 2009-04-02 コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ 被印刷物上への物質の液滴の制御位置決めに対するインクジェット装置、物質の液滴の制御位置決めに対する方法、及び、インクジェット装置の使用
CN101282842B (zh) 2005-10-07 2010-09-01 皇家飞利浦电子股份有限公司 用于将物质小滴受控地定位到基底上的喷墨装置和方法
EP1782886A1 (fr) 2005-11-02 2007-05-09 Sony Deutschland GmbH Méthode pour la fabrication des motifs moléculaires sur un substrat utilisant un procédé d'impression microcontact
WO2007060634A1 (fr) 2005-11-28 2007-05-31 Koninklijke Philips Electronics N. V. Dispositif de projection d'encre qui libere de maniere controlee plusieurs substances sur un substrat, procede permettant de distinguer differentes substances et utilisation du dispositif de projection d'encre
EP1963105A2 (fr) 2005-12-22 2008-09-03 Koninklijke Philips Electronics N.V. Dispositif a jet d encre servant a positionner une substance sur un substrat et procede de positionnement d'une substance sur un substrat et utilisation d'un dispositif a jet d encre
EP1976637A1 (fr) 2006-01-12 2008-10-08 Koninklijke Philips Electronics N.V. Dispositif de jet d'encre et procédé pour libérer une pluralité de substances sur un substrat
JP2009538123A (ja) 2006-04-19 2009-11-05 アプライド バイオシステムズ, エルエルシー ゲル非含有ビーズベースの配列決定のための試薬、方法およびライブラリー
EP2066437A2 (fr) 2006-09-21 2009-06-10 Koninklijke Philips Electronics N.V. Dispositif à jet d'encre et procédé de production de substrats d'essai biologique par libération d'une pluralité de substances sur ledit substrat
BRPI0718223A2 (pt) 2006-10-30 2013-11-12 Koninkl Philips Electronics Nv Substrato de ensaio biológico poroso, métodos para produzir um substrato de ensaio biológico e para examinar fluidos de analito, e, dispositivo de jato de tinta para produzir um substrato de ensaio biológico
WO2008141048A1 (fr) 2007-05-09 2008-11-20 Nanoink, Inc. Appareil de nanofabrication compact
WO2008156732A2 (fr) 2007-06-20 2008-12-24 Northwestern University Formation de réseaux créés à l'aide de compositions comprenant des lipides
WO2009011709A1 (fr) 2007-07-19 2009-01-22 The Board Of Trustees Of The University Of Illinois Impression par jet électrohydrodynamique à haute résolution pour des systèmes de fabrication
US8452725B2 (en) 2008-09-03 2013-05-28 Hamid Hatami-Hanza System and method of ontological subject mapping for knowledge processing applications
US9684678B2 (en) 2007-07-26 2017-06-20 Hamid Hatami-Hanza Methods and system for investigation of compositions of ontological subjects
CZ301799B6 (cs) 2007-07-30 2010-06-23 Kencl@Lukáš Zpusob úpravy datové informace v systému
CN101835612B (zh) 2007-08-20 2013-01-02 摩尔·华莱士北美公司 喷墨印刷的方法及装置
DE102007057802B3 (de) 2007-11-30 2009-06-10 Geneart Ag Steganographische Einbettung von Informationen in kodierenden Genen
JP5171346B2 (ja) 2008-03-28 2013-03-27 株式会社日立ハイテクノロジーズ 文字列検索システム及び方法
JP2012502383A (ja) 2008-09-10 2012-01-26 データレース リミテッド 多色刷りコード
US9062218B2 (en) 2008-09-11 2015-06-23 Nagahama Bio-Laboratory Incorporated DNA-containing ink composition
US8769689B2 (en) 2009-04-24 2014-07-01 Hb Gary, Inc. Digital DNA sequence
US8806127B2 (en) 2009-10-26 2014-08-12 Genisyss Llc Data storage device with integrated DNA storage media
US20110269119A1 (en) 2009-10-30 2011-11-03 Synthetic Genomics, Inc. Encoding text into nucleic acid sequences
US8735327B2 (en) 2010-01-07 2014-05-27 Jeansee, Llc Combinatorial DNA taggants and methods of preparation and use thereof
WO2011150168A1 (fr) 2010-05-28 2011-12-01 Gen9, Inc. Procédés et dispositifs de synthèse in situ d'acides nucléiques
US20110312851A1 (en) 2010-06-17 2011-12-22 Geneasys Pty Ltd Device for high density spotting of oligonucleotides
US9114399B2 (en) 2010-08-31 2015-08-25 Canon U.S. Life Sciences, Inc. System and method for serial processing of multiple nucleic acid assays
DK2630263T4 (da) 2010-10-22 2022-02-14 Cold Spring Harbor Laboratory Varital tælling af nucleinsyrer for at opnå information om antal genomiske kopier
US20120329561A1 (en) 2010-12-09 2012-12-27 Genomic Arts, LLC System and methods for generating avatars and art
KR101345337B1 (ko) 2011-06-13 2013-12-30 한국생명공학연구원 원자간력 현미경(afm)을 이용한 딥-펜 나노리소그래피에서의 단일 또는 다중팁을 이용한 나노포지셔닝 기판 제조장치 및 제조방법
EP3318872A1 (fr) 2011-07-20 2018-05-09 The Regents of the University of California Dispositif à deux pores
WO2013170009A1 (fr) 2012-05-09 2013-11-14 Applied Dna Sciences, Inc. Vérification de marqueurs de chiffrement physiques au moyen de représentants numériques et d'authentifications de ceux-ci
AU2013269536B2 (en) 2012-06-01 2018-11-08 European Molecular Biology Laboratory High-capacity storage of digital information in DNA
CN108875312A (zh) 2012-07-19 2018-11-23 哈佛大学校长及研究员协会 利用核酸存储信息的方法
US9266370B2 (en) 2012-10-10 2016-02-23 Apdn (B.V.I) Inc. DNA marking of previously undistinguished items for traceability
US8937564B2 (en) 2013-01-10 2015-01-20 Infinidat Ltd. System, method and non-transitory computer readable medium for compressing genetic information
US20160007893A1 (en) 2013-02-06 2016-01-14 Loxbridge Research Llp Systems and methods for early disease detection and real-time disease monitoring
KR102245192B1 (ko) 2013-05-06 2021-04-29 온테라 인크. 나노포어를 이용한 표적 검출
US9904734B2 (en) 2013-10-07 2018-02-27 Apdn (B.V.I.) Inc. Multimode image and spectral reader
EP3123376A1 (fr) 2014-03-28 2017-02-01 Thomson Licensing Procédés de stockage et de lecture de données numériques sur un ensemble de brins d'adn
US10020826B2 (en) 2014-04-02 2018-07-10 International Business Machines Corporation Generating molecular encoding information for data storage
US20150312212A1 (en) 2014-04-24 2015-10-29 David Holmes Holistic embodiment of dna and ipv6
EP2958238A1 (fr) 2014-06-17 2015-12-23 Thomson Licensing Procédé et appareil de codage d'unités d'information dans des séquences de mots de code évitant la complémentarité inverse
KR101788673B1 (ko) 2014-06-24 2017-11-15 싸이퍼롬, 인코퍼레이티드 핵산염기서열 보안 방법, 장치 및 이를 저장한 기록매체
WO2016019078A1 (fr) 2014-07-30 2016-02-04 Tufts University Impression tridimensionnelle de compositions d'encre biologique
WO2016015701A1 (fr) 2014-07-31 2016-02-04 Schebo Biotech Ag Dispositif d'analyse biologique, sa fabrication et procédé de détection d'analytes biologiques au moyen du dispositif
EP2983297A1 (fr) 2014-08-08 2016-02-10 Thomson Licensing Procédé de génération de code, appareil de génération de code et support de stockage lisible par ordinateur
CA2959312A1 (fr) 2014-08-28 2016-03-03 Apdn (B.V.I.) Inc. Procedes d'extraction, de detection et d'authentification de l'adn sur le terrain, et systemes associes
JP6630347B2 (ja) 2014-09-03 2020-01-15 ナントヘルス,インコーポレーテッド 合成ゲノム変異体ベースの安全なトランザクション装置、システム、及び方法
JP2017538234A (ja) 2014-10-18 2017-12-21 マリク、ギリクMALIK, Girik データ保管システム
EP3215895B1 (fr) 2014-11-03 2022-02-23 Universität Osnabrück Procédé de réalisation d'une nanoimpression capillaire, champ de gouttes d'encre et champ de cables obtenus par ledit procédé
AU2015349782B2 (en) 2014-11-20 2020-08-13 Cytonics Corporation Therapeutic variant alpha-2-macroglobulin compositions
WO2016164779A1 (fr) 2015-04-10 2016-10-13 University Of Washington Système intégré pour un stockage à base d'acide nucléique de données numériques
US10385387B2 (en) 2015-04-20 2019-08-20 Pacific Biosciences Of California, Inc. Methods for selectively amplifying and tagging nucleic acids
US10589273B2 (en) 2015-05-08 2020-03-17 Illumina, Inc. Cationic polymers and method of surface application
US10423341B1 (en) 2015-06-12 2019-09-24 Bahram Ghaffarzadeh Kermani Accurate and efficient DNA-based storage of electronic data
US9898579B2 (en) 2015-06-16 2018-02-20 Microsoft Technology Licensing, Llc Relational DNA operations
EP3322812B1 (fr) 2015-07-13 2022-05-18 President and Fellows of Harvard College Procédés de stockage d'informations récupérables utilisant des acides nucléiques
KR20180058772A (ko) 2015-09-22 2018-06-01 트위스트 바이오사이언스 코포레이션 핵산 합성을 위한 가요성 기판
US20170093851A1 (en) 2015-09-30 2017-03-30 Aetna Inc. Biometric authentication system
US20170136452A1 (en) 2015-11-13 2017-05-18 SoluDot LLC Method for high throughput dispensing of biological samples
US10566077B1 (en) 2015-11-19 2020-02-18 The Board Of Trustees Of The University Of Illinois Re-writable DNA-based digital storage with random access
US10047235B2 (en) 2015-12-08 2018-08-14 Xerox Corporation Encoding liquid ink with a device specific biomarker
US10438662B2 (en) 2016-02-29 2019-10-08 Iridia, Inc. Methods, compositions, and devices for information storage
WO2017151195A1 (fr) 2016-02-29 2017-09-08 The Penn State Research Foundation Diagnostic moléculaire d'acide nucléique
US10640822B2 (en) * 2016-02-29 2020-05-05 Iridia, Inc. Systems and methods for writing, reading, and controlling data stored in a polymer
WO2017184677A1 (fr) 2016-04-21 2017-10-26 President And Fellows Of Harvard College Méthode et système de codage d'informations à base de nanopores
US11514331B2 (en) * 2016-04-27 2022-11-29 Massachusetts Institute Of Technology Sequence-controlled polymer random access memory storage
WO2017190297A1 (fr) 2016-05-04 2017-11-09 深圳华大基因研究院 Procédé d'utilisation d'adn pour mémoriser des informations textuelles, procédé de décodage correspondant et application correspondante
WO2018005117A1 (fr) 2016-07-01 2018-01-04 Microsoft Technology Licensing, Llc Stockage par édition itérative d'adn
EP3426793A4 (fr) 2016-07-22 2019-03-27 Hewlett-Packard Development Company, L.P. Procédé de préparation d'échantillons de test
CA3031415A1 (fr) 2016-07-22 2018-01-25 Nucleotrace Pty. Ltd. Procede d'amplification de sequences d'acides nucleiques
WO2018049272A1 (fr) 2016-09-08 2018-03-15 Thomas Villwock Procédés et systèmes d'authentification de biens à l'aide de fluides de sécurité codés par des analytes
US10417457B2 (en) 2016-09-21 2019-09-17 Twist Bioscience Corporation Nucleic acid based data storage
US10370246B1 (en) 2016-10-20 2019-08-06 The Board Of Trustees Of The University Of Illinois Portable and low-error DNA-based data storage
US10838939B2 (en) 2016-10-28 2020-11-17 Integrated Dna Technologies, Inc. DNA data storage using reusable nucleic acids
CA3043887A1 (fr) 2016-11-16 2018-05-24 Catalog Technologies, Inc. Stockage de donnees base sur des acides nucleiques
US10650312B2 (en) 2016-11-16 2020-05-12 Catalog Technologies, Inc. Nucleic acid-based data storage
US10853244B2 (en) 2016-12-07 2020-12-01 Sandisk Technologies Llc Randomly writable memory device and method of operating thereof
US10417208B2 (en) 2016-12-15 2019-09-17 Sap Se Constant range minimum query
US10984029B2 (en) 2016-12-15 2021-04-20 Sap Se Multi-level directory tree with fixed superblock and block sizes for select operations on bit vectors
KR102622275B1 (ko) 2017-01-10 2024-01-05 로스웰 바이오테크놀로지스 인코포레이티드 Dna 데이터 저장을 위한 방법들 및 시스템들
WO2018148458A1 (fr) 2017-02-08 2018-08-16 Essenlix Corp. Dosage numérique
US10793897B2 (en) 2017-02-08 2020-10-06 Microsoft Technology Licensing, Llc Primer and payload design for retrieval of stored polynucleotides
US10787699B2 (en) 2017-02-08 2020-09-29 Microsoft Technology Licensing, Llc Generating pluralities of primer and payload designs for retrieval of stored nucleotides
WO2018148260A1 (fr) 2017-02-13 2018-08-16 Thomson Licensing Appareil, méthode et système de mémorisation d'informations numériques dans de l'acide désoxyribonucléique (adn)
US10920274B2 (en) 2017-02-21 2021-02-16 Apdn (B.V.I.) Inc. Nucleic acid coated submicron particles for authentication
CA3054303A1 (fr) 2017-02-22 2018-08-30 Twist Bioscience Corporation Stockage de donnees reposant sur un acide nucleique
US10774379B2 (en) 2017-03-15 2020-09-15 Microsoft Technology Licensing, Llc Random access of data encoded by polynucleotides
RU2769652C2 (ru) 2017-05-16 2022-04-04 Албертус Баренд ГЕЛДЕНХЕЙС Обработка мельчайших деталей цифровых данных для анализа культурных артефактов
US10742233B2 (en) 2017-07-11 2020-08-11 Erlich Lab Llc Efficient encoding of data for storage in polymers such as DNA
WO2019081145A1 (fr) 2017-10-27 2019-05-02 Eth Zurich Codage et décodage d'informations dans un adn synthétique avec des clés cryptographiques générées sur la base de caractéristiques polymorphes d'acides nucléiques
EP3707150A1 (fr) 2017-11-10 2020-09-16 Massachusetts Institute Of Technology Production microbienne d'acides nucléiques simple brin purs
AU2019205269A1 (en) 2018-01-04 2020-07-30 Twist Bioscience Corporation DNA-based digital information storage
CA3093846A1 (fr) 2018-03-15 2019-09-19 Twinstrand Biosciences, Inc. Procedes et reactifs pour l'enrichissement de materiau d'acide nucleique pour des applications de sequencage et d'autres interrogations de materiau d'acide nucleique
JP7364604B2 (ja) 2018-03-16 2023-10-18 カタログ テクノロジーズ, インコーポレイテッド 核酸ベースのデータ記憶のための化学的方法
KR102138864B1 (ko) 2018-04-11 2020-07-28 경희대학교 산학협력단 Dna 디지털 데이터 저장 장치 및 저장 방법, 그리고 디코딩 방법
US10956806B2 (en) 2019-06-10 2021-03-23 International Business Machines Corporation Efficient assembly of oligonucleotides for nucleic acid based data storage
US10917109B1 (en) 2020-03-06 2021-02-09 Centre National De La Recherche Scientifique Methods for storing digital data as, and for transforming digital data into, synthetic DNA

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012058638A2 (fr) * 2010-10-29 2012-05-03 President And Fellows Of Harvard College Sondes code à barres à nanostructure d'acide nucléique
US20130253839A1 (en) * 2012-03-23 2013-09-26 International Business Machines Corporation Surprisal data reduction of genetic data for transmission, storage, and analysis
WO2018102064A1 (fr) * 2016-11-30 2018-06-07 Microsoft Technology Licensing, Llc. Système de stockage d'adn à accès aléatoire par l'intermédiaire d'une ligature

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
Craig et al. Ordering of cosmid clones covering the Herpes simplex virus type I (HSV-I) genome: a test case for fingerprinting by hybridization. Nucleic Acids Research. volume 18, pages 2653-2660. (Year: 1990) *

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US12001962B2 (en) 2016-11-16 2024-06-04 Catalog Technologies, Inc. Systems for nucleic acid-based data storage
US11379729B2 (en) 2016-11-16 2022-07-05 Catalog Technologies, Inc. Nucleic acid-based data storage
US11763169B2 (en) 2016-11-16 2023-09-19 Catalog Technologies, Inc. Systems for nucleic acid-based data storage
US11286479B2 (en) 2018-03-16 2022-03-29 Catalog Technologies, Inc. Chemical methods for nucleic acid-based data storage
US12006497B2 (en) 2018-03-16 2024-06-11 Catalog Technologies, Inc. Chemical methods for nucleic acid-based data storage
US11249941B2 (en) * 2018-12-21 2022-02-15 Palo Alto Research Center Incorporated Exabyte-scale data storage using sequence-controlled polymers
US12002547B2 (en) 2019-05-09 2024-06-04 Catalog Technologies, Inc. Data structures and operations for searching, computing, and indexing in DNA-based data storage
US11610651B2 (en) 2019-05-09 2023-03-21 Catalog Technologies, Inc. Data structures and operations for searching, computing, and indexing in DNA-based data storage
US20210049491A1 (en) * 2019-08-12 2021-02-18 International Business Machines Corporation Qubit sensory representation
US11535842B2 (en) 2019-10-11 2022-12-27 Catalog Technologies, Inc. Nucleic acid security and authentication
WO2021072398A1 (fr) 2019-10-11 2021-04-15 Catalog Technologies, Inc. Sécurité et authentification par acide nucléique
WO2021231493A1 (fr) 2020-05-11 2021-11-18 Catalog Technologies, Inc. Programmes et fonctions dans un stockage de données à base d'adn
US20210391033A1 (en) * 2020-06-15 2021-12-16 Life Technologies Corporation Smart qPCR
WO2022055885A1 (fr) * 2020-09-08 2022-03-17 Catalog Technologies, Inc. Systèmes et procédés d'écriture par séquençage d'acides nucléiques
WO2022066637A1 (fr) 2020-09-22 2022-03-31 Catalog Technologies, Inc. Système de réactions fluidiques à température régulée
WO2024132107A1 (fr) * 2022-12-20 2024-06-27 Ribbon Biolabs Gmbh Ligature d'oligonucléotides
WO2024163733A1 (fr) * 2023-02-01 2024-08-08 Twist Bioscience Corporation Synthèse électrochimique avec nucléotides stables â l'oxydoréduction

Also Published As

Publication number Publication date
EP3794598A1 (fr) 2021-03-24
US20210209479A1 (en) 2021-07-08
AU2019270159A1 (en) 2020-12-03
US11227219B2 (en) 2022-01-18
CA3100529A1 (fr) 2019-11-21
JP2021524229A (ja) 2021-09-13
WO2019222561A1 (fr) 2019-11-21
KR20210029147A (ko) 2021-03-15

Similar Documents

Publication Publication Date Title
US11227219B2 (en) Compositions and methods for nucleic acid-based data storage
US11379729B2 (en) Nucleic acid-based data storage
US20230376788A1 (en) Nucleic acid-based data storage
US12006497B2 (en) Chemical methods for nucleic acid-based data storage
US20230308275A1 (en) Nucleic acid storage for blockchain and non-fungible tokens
CA3214604A1 (fr) Representation de nombre de points fixes et circuits de calcul
WO2023168085A1 (fr) Microréseaux d'adn et séquençage de niveau de composant pour le stockage et le traitement de données à base d'acide nucléique
KR20240153382A (ko) 핵산-기반 데이터 저장 및 처리를 위한 dna 마이크로어레이 및 구성요소 수준 시퀀싱
AU2023234435A1 (en) Combinatorial enumeration and search for nucleic acid-based data storage

Legal Events

Date Code Title Description
AS Assignment

Owner name: CATALOG TECHNOLOGIES, INC., MASSACHUSETTS

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:ROQUET, NATHANIEL;PARK, HYUNJUN;BHATIA, SWAPNIL P.;AND OTHERS;REEL/FRAME:051875/0295

Effective date: 20200124

STPP Information on status: patent application and granting procedure in general

Free format text: APPLICATION DISPATCHED FROM PREEXAM, NOT YET DOCKETED

STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: FINAL REJECTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION

STPP Information on status: patent application and granting procedure in general

Free format text: FINAL REJECTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED