[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

WO2013049420A1 - System and method for facilitating network-based transactions involving sequence data - Google Patents

System and method for facilitating network-based transactions involving sequence data Download PDF

Info

Publication number
WO2013049420A1
WO2013049420A1 PCT/US2012/057668 US2012057668W WO2013049420A1 WO 2013049420 A1 WO2013049420 A1 WO 2013049420A1 US 2012057668 W US2012057668 W US 2012057668W WO 2013049420 A1 WO2013049420 A1 WO 2013049420A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
biological
information
data units
file
Prior art date
Application number
PCT/US2012/057668
Other languages
French (fr)
Inventor
Dan MALTBIE
Lawrence Ganeshalingam
Patrick Allen
Original Assignee
Maltbie Dan
Lawrence Ganeshalingam
Patrick Allen
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US13/417,184 external-priority patent/US20120233201A1/en
Application filed by Maltbie Dan, Lawrence Ganeshalingam, Patrick Allen filed Critical Maltbie Dan
Priority to EP12835985.8A priority Critical patent/EP2761518A4/en
Publication of WO2013049420A1 publication Critical patent/WO2013049420A1/en

Links

Classifications

    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16BBIOINFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR GENETIC OR PROTEIN-RELATED DATA PROCESSING IN COMPUTATIONAL MOLECULAR BIOLOGY
    • G16B50/00ICT programming tools or database systems specially adapted for bioinformatics
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16BBIOINFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR GENETIC OR PROTEIN-RELATED DATA PROCESSING IN COMPUTATIONAL MOLECULAR BIOLOGY
    • G16B50/00ICT programming tools or database systems specially adapted for bioinformatics
    • G16B50/30Data warehousing; Computing architectures
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16BBIOINFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR GENETIC OR PROTEIN-RELATED DATA PROCESSING IN COMPUTATIONAL MOLECULAR BIOLOGY
    • G16B50/00ICT programming tools or database systems specially adapted for bioinformatics
    • G16B50/40Encryption of genetic data
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16BBIOINFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR GENETIC OR PROTEIN-RELATED DATA PROCESSING IN COMPUTATIONAL MOLECULAR BIOLOGY
    • G16B50/00ICT programming tools or database systems specially adapted for bioinformatics
    • G16B50/50Compression of genetic data

Definitions

  • This application is generally directed to processing polymeric sequence information, including biopolymeric sequence information such as DNA sequence information, and to transmission of such sequence information between locations within a network.
  • DNA sequencing is the process of determining the ordering of nucleotide bases (adenine (A), guanine (G), cytosine (C) and thymine (T)) in molecular DNA.
  • A adenine
  • G guanine
  • C cytosine
  • T thymine
  • nucleotide base sequence data collected from DNA sequencing operations are stored in multiple different formats in a number of different databases.
  • databases also contain scientific information related to the DNA sequence data including, for example, information concerning single nucleotide polymorphisms (SNPs), gene expression, copy number variations.
  • SNPs single nucleotide polymorphisms
  • transcriptomic and proteomic data are also present in multiple formats in multiple databases. This renders it impractical to exchange and process the sources of DNA sequence data and related information collected in various locations, thereby hampering the potential for scientific discoveries and advancements.
  • This disclosure is generally directed to a method of processing, transmitting, and otherwise facilitating network-based transactions involving, polymeric sequence information. More particularly but not exclusively, in one aspect the disclosure describes systems and methods for facilitating uploading, downloading and other network-based transactions involving sequence information, such as large files of genomic sequence data. These transactions may involve communicating such large files of sequence information between entities such as, for example, genome sequence centers (GSCs), genome data repositories (GDRs), genome data analysis companies (GDACs) and or data coordination centers (DCCs). Each of these entities may be either public institutions privately owned or privately-owned enterprises.
  • GSCs genome sequence centers
  • GDRs genome data repositories
  • GDACs genome data analysis companies
  • DCCs data coordination centers
  • the sequencing data involved in such transactions may be generated by, for example, a GSC, which receives a purified prep of a patient's chromosomal and or mitochondria DNA, or an RNA prep, for sequencing.
  • the patient's identification will typically be anonymized with a series of codes to label the specific aliquot from a sample preparation and the organ, tissue or cell types.
  • other information including but not limited to EMR data, clinical and pharmacological as well other network metadata that is specific to the particular patient can be collected by the DCCs but kept separate from the genomic data.
  • the sequence data that is generated by the GSCs may be provided to or otherwise transferred within a biological data network, which may also be referred to herein as a Biolntelligent or "bIQ" network.
  • a biological data network which may also be referred to herein as a Biolntelligent or "bIQ" network.
  • An exemplary bIQ network is described within, for example, U.S. Patent Application Publication No. 2012/0233201.
  • Metadata relating to the sequence data may be collected and utilized during the processing of the sequence data throughout the bIQ network in order to, for example, facilitate data coordination, correlation, privacy, security, validation and authentication.
  • the genome storage repository includes a receive interface for receiving, from over a network, a plurality of portions of at least one file of biological sequence data conveyed over the network in accordance with a parallel file transfer process.
  • the genome storage repository further includes a controller in communication with the receive interface and the data repository. The controller generates a reconstructed file of biological sequence data by reconstructing the at least one file of biological sequence data using the plurality of portions of the at least one file of biological sequence data.
  • the disclosure is directed to a subscriber node operable within a biological data network.
  • the subscriber node includes a receive interface for receiving, over one or more data links of the biological data network, a plurality of biological data units containing encoded genomic information wherein the encoded genomic information represents genomic information encoded relative to a reference sequence.
  • the subscriber node further includes a controller for processing the plurality of biological data units.
  • the disclosure is also directed to a genome storage repository including a data repository containing encoded genomic information and biological information relating to the encoded genomic information.
  • the genome storage repository also includes a controller for generating a plurality of data units containing the encoded genomic information and the biological information.
  • a transmit interface operates to transfer the plurality of data units to a subscriber device over a network.
  • the disclosure pertains to a node operable within a biological data network.
  • the node includes a receive interface for receiving a plurality of data units from one or more data links of the biological data network wherein each of the plurality of data units includes a payload representative of encoded genomic information and a header representative of biological information relating to the encoded genomic information.
  • the node further includes a data repository and a controller for storing the plurality of data units within the data repository.
  • the disclosure relates to a subscriber node having a receive interface for receiving, from over a network, an encrypted data unit containing encoded genomic information wherein the encoded genomic information represents genomic information encoded relative to a reference sequence using a plurality of instructions.
  • the subscriber node further includes a controller for decrypting the encrypted data unit using a subscriber key.
  • the disclosure further pertains to a method which includes receiving, from over a network, a plurality of portions of at least one file of biological sequence data conveyed over the network in accordance with a parallel file transfer process wherein ones of the plurality of portions are transferred substantially simultaneously in multiple data streams.
  • the method also includes generating a reconstructed file of biological sequence data by reconstructing the at least one file of biological sequence data using the plurality of portions of the at least one file of biological sequence data.
  • the at least one file of biological sequence data is then stored within a data repository.
  • the disclosure relates to a method which includes receiving, over one or more data links of a biological data network, a plurality of biological data units containing encoded genomic information wherein the encoded genomic information represents genomic information encoded relative to a reference sequence.
  • the method further includes processing the plurality of biological data units and storing the plurality of biological data units within a memory unit.
  • the disclosure pertains to a method which includes establishing a data repository containing encoded genomic information and biological information relating to the encoded genomic information. The method further includes generating a plurality of data units containing the encoded genomic information and the biological information. The plurality of data units are then transferred to a subscriber device over a network.
  • the disclosure is also directed to a method which includes receiving a plurality of data units from one or more data links of a biological data network wherein each of the plurality of data units includes a payload representative of encoded genomic information and a header representative of biological information relating to the encoded genomic information.
  • the method also includes storing the plurality of data units within a data repository.
  • the disclosure pertains to a method which includes receiving, from over a network, an encrypted data unit containing encoded genomic information wherein the encoded genomic information represents genomic information encoded relative to a reference sequence using a plurality of instructions.
  • the method also includes decrypting the encrypted data unit using a subscriber key so as to generate a decrypted data unit and storing the decrypted data unit within a memory.
  • the disclosure relates to a genome storage repository including a data repository containing encoded genomic information and biological information relating to the encoded genomic information.
  • the genome storage repository includes a receive interface for receiving, from over a network, a processing request from an analysis node.
  • the genome storage repository further includes a controller operative to process, in response to the processing request, at least the genomic information in accordance with an analysis program in order to generate analysis results.
  • the genome storage repository may further include a transmit interface configured to transmit the analysis results over the network to the analysis node.
  • the receive interface may be further configured to receive the analysis program from the analysis node.
  • the disclosure relates to a method which includes establishing a data repository containing encoded genomic information and biological information relating to the encoded genomic information.
  • the method also includes receiving, from over a network, a processing request from an analysis node.
  • the method includes processing, in response to the processing request, at least the genomic information in accordance with an analysis program in order to generate analysis results.
  • the method may also contemplate transmitting the analysis results over the network to the analysis node and receiving the analysis program from the analysis node.
  • FIG. 1 illustratively represents a genome sequence data network incorporating a high capacity, high throughput networked-based genome storage repository (GSR).
  • GSR genome storage repository
  • FIG. 2 illustrates a first exemplary implementation of a genome sequencing center (GSC) configured to operate in a biological data network.
  • GSC genome sequencing center
  • FIG. 3 depicts a second exemplary implementation of a GSC configured to operate in a biological data network.
  • FIG. 4 illustrates an exemplary implementation of a network-based genome storage repository.
  • FIG. 5 depicts a codec schema representative of various encoding, decoding, encryption, decryption and transcoding operations which may be effected within a biological data network.
  • FIG. 6 shows one manner in which a distributed conditional access system (DCAS) may be employed for the management of access to the data within a biological data network.
  • DCAS distributed conditional access system
  • FIG. 7 illustratively represents the incorporation of a distributed conditional access system (DCAS) within an alternative data network.
  • DCAS distributed conditional access system
  • FIG. 8 illustrates one manner in which the encode/decode and encrypt/decrypt schema described with reference to FIGS. 1-7 may be utilized to mediate genomic-based transactions among various users of a biological data network.
  • FIG. 9 is a flowchart of an encoding and encryption process which may be employed within a biological data network.
  • FIG. 10 illustrates a comparative sequence analysis process used to minimize apparent biological differences between a reference and a sample sequence entry.
  • FIG. 11 is a flowchart of an alternate encoding and encryption process capable of being employed within a biological data network.
  • FIG. 12 provides a high-level view of the architecture of a GeneTorrentTM system configured to to enable a cluster of servers to tranfer parallel streams of file information to a user system.
  • FIGS. 13-18 illustrate exemplary operation of one embodiment of a Transactor.
  • FIGS. 19A-19B illustrate an exemplary GeneTorrentTM upload operation.
  • FIGS. 20A-20B provide an illustration of a secure GeneTorrentTM download workflow between client-side GeneTorrentTM data consumers and various server-side components.
  • FIG. 21 illustrates an exemplary software architecture of a system capable of providing GeneTorrentTM file transfer capability.
  • FIG. 22 illustrates an exemplary system architecture capable of supporting the software architecture of FIG. 21.
  • FIG. 1 illustratively represents a genome sequence data network 100 incorporating a high capacity, high throughput networked-based genome storage repository (GSR) 110.
  • the network may also be referred to herein as a bIQ network.
  • the GSR 110 which contains genomic sequence data and related information, is in network communication with one or more genome sequencing centers (GSCs) 114, one or more genome data analysis centers (GDACs) 116, and one or more subscriber systems 120.
  • GSCs genome sequencing centers
  • GDACs genome data analysis centers
  • subscriber systems 120 In an exemplary embodiment such network communication is designed to take place over one or more existing wide area networks, such as the Internet.
  • the GSR 110 may function as a central repository for the GSCs 114 to store, and GDACs 116 to retrieve, sequence data and associated metadata.
  • a typical workflow scenario involving the network 100 may begin with submission of a tissue sample to a GSC 114 or associated institution for preparation of genome analyte.
  • the workflow continues with DNA/RNA sequencing and characterization by a GSC 114 and upload of the resultant sequence data and related information to the GSR 110.
  • the sequence data produced by the GSC 114 is produced in a BAM format or other conventional format and is transferred to the GSR 110 using the GeneTorrentTM techniques described in the above -referenced provisional patent application nos. 61/539,942 and 61/662,996.
  • the received BAM files may be encoded into the bIQ format described hereinafter and in the above -referenced patent applications.
  • the bIQ- formatted data may then be downloaded to subscriber systems 120 using GeneTorrentTM techniques or otherwise made available for further processing by one or more genome data analysis centers (GDACS) 116.
  • GDACS genome data analysis centers
  • the GSR 110 also synchronizes with a data coordination center (DCC) 124 or equivalent system configured to provide the primary coordination portal for researchers or other personnel involved with a particular research initiative, project or commercial endeavor.
  • DCC data coordination center
  • the applicable DCC 124 maintains the higher-level study attributes and clinical data associated with each tissue sample.
  • the GSR 110 will query the applicable DCC 124 to verify that submitted data is associated with a valid sample.
  • the DCC 412 can also retrieve catalog information from an external source and allow users to perform queries across project, sample and sequence data.
  • a bio-specimen e.g., a tissue sample
  • the GSCs 114 or to an associated institution such as a Biospecimen Core Resource
  • Aliquots of the analyte e.g., DNA or RNA
  • the GSC 114 uploads the resultant sequence data and associated metadata to the GSR 110 and may transfer other metadata, e.g., Sample and Data Relationship Format (SDRF) metadata, to a project data portal provided by the DCC 124.
  • SDRF Sample and Data Relationship Format
  • the GSR 110 will generally synchronize information, and otherwise coordinate closely, with the one or more DCCs 124 respectively providing coordination portals for various projects or groups of researchers.
  • each of the DCCs 124 maintains the higher-level study attributes associated with at least one such project as well as clinical data associated with each sample.
  • the GSR 110 will query the appropriate DCC 124 to verify that data submitted by a GSC 114 is associated with a valid sample.
  • some or all of the DCCs 124 may retrieve catalog information in order to enable users at the GDACs 116 to perform queries across project, sample and sequence data.
  • queries from GDACs 116 will be received through a portal or other interface established by the GSR 110.
  • the repository 110 consults an external user authentication database (not shown) in connection with authorization of users for uploading, downloading, and/or querying of sequence information.
  • an external user authentication database not shown
  • users may be authorized for different roles with respect to different projects coordinated by the DCCs 124.
  • a unique ID (“UUID") is assigned to each aliquot of the tissue samples provided to or processed by a particular GSC 114.
  • the UUID may, for example, be included within anonymized metadata associated with each physical aliquot sample and electronically transmitted by the GSC 114 to the DCC 124.
  • metadata may include, for example, information identifying the tissue source site, sample type, analyte type, patient ID, and other information characterizing the sample or the facilities/equipment used to obtain the sample.
  • the DCC 124 then creates a new sample record based upon this metadata, which is associated with the UUID corresponding to the aliquot.
  • This metadata can then be retrieved from the DCC 124 through, for example, a web interface which may or may not be provided by a data portal of the DCC 124.
  • the GSC 114 to which the sample is provided will perform sequencing and thereby generate BAM file(s), or other files of predefined type, containing the resultant sequence information.
  • the GSC 114 then defines an analysis object ("Analysis object"), which in one embodiment includes a metadata file and the BAM files(s) corresponding to the metadata.
  • the GSC 114 also assigns a UUID to the Analysis object.
  • An upload client (described below) at the GSC 114 then initiates the sequence submission process by passing a user certification/session token and the submission metadata to the GSR 110 for validation. If validation is successful, the GSR 110 will create a database entry for the Analysis object and each of its constituent BAM files. As is discussed below, the GSR 110 will then track the status of the submission as it moves from loading, through any validation or transfer errors, until it is ready for download by a subscriber system 120.
  • each metadata file may include references to the UUIDs corresponding to all of the sequence data files (e.g., BAM files or other sequence data files of predefined type) and aliquots linked to the bio-specimen data (i.e., data related to the initial tissue sample) maintained within the DCC 124.
  • this information may be included within a separate file which is independently provided by the GSC 114 to the GSR 110 as part of the sequence submission process.
  • the GSR 110 may then verify that these UUIDs correspond to valid UUIDs stored within the DCC 124 before creating a corresponding submission record and UUID corresponding to each Analysis object (and potentially each individual BAM file of the Analysis object) to be uploaded.
  • the sequence data associated with a given submission may be suppressed, and new sequence data can be submitted for the same sample. This may occur with respect to cases in which, for example, it is desired to "top off a previous submission with more complete coverage.
  • the GSR 110 maintains a list of "valid" bio-specimens (e.g., tissue samples) for a particular project and regularly synchronizes this list to corresponding information maintained at the corresponding DCC 124. This enables the sequence information corresponding to a particular sample to be redacted at the GSR 110 in response to information received from the DCC 124. For example, if the owner of a particular tissue sample at some point revokes consent relating to the download of sequence information derived from the sample, such sequence information could be redacted at the GSR 110.
  • tissue samples e.g., tissue samples
  • the metadata information associated with such redacted sequence information could be searched in response to queries submitted by subscriber systems 120 and/or GDACs 116, but the associated, redacted sequence information would not be available for download.
  • only users of a subscriber system 120 having a certain authorization or subscription level would be permitted to download sequence information corresponding to metadata identified in response to a query received from such a system 120; that is, such sequence information would be appear to be redacted or otherwise suppressed or unavailable when identified in metadata returned in response to queries received from unauthorized users.
  • the GSC 114 may utilize a highspeed, parallelized file transfer process to transfer the BAM file(s) associated with the Analysis object to the GSR 110.
  • the BAM file(s) are encrypted using a key specific to the particular session in which the file(s) are transferred.
  • the associated metadata which will generally be included within an encrypted file of inconsequential size relative to the size of the Analysis object, may then be separately sent to the GSR 110 using a conventional file transfer process.
  • the encrypted BAM files(s) are decrypted and the sequence data included therein is encoded into the biQ format for storage, typically together with all or part of the metadata.
  • a substantially similar or identical high-speed, parallelized file transfer process may then be used to communicate the encoded sequence data and related metadata of interest the requesting system 120.
  • the encoded sequence data and related metadata is encrypted using both a key specific to the particular session in which the transfer occurs and a key unique to the requesting subscriber system 120.
  • FIG. 2 illustrates a first exemplary implementation of a GSC 114.
  • One or more high-speed sequencing machines 202 are operative to generate sequence reads, which are then aligned and mapped to a reference sequence in alignment / mapping module 206. Variants may also be called.
  • the module 206 produces BAM files comprised of sequence alignment data; that is, binary versions of sequence alignment/mapping (SAM) files.
  • SAM sequence alignment/mapping
  • the BAM files produced by the module 206 are provided to an input interface 210 of a processing module 220.
  • a processor 224 operates to store the received BAM files along with related metadata within a file storage unit 228 and executes an encryption module 240 to encrypt this information using a key associated with, for example, a particular data transfer session.
  • the processor 224 executes the instructions of a GeneTorrentTM upload client 230 to transfer the BAM files within the file storage unit 228 to the GSR 110 via a network interface 236.
  • the metadata stored within the file storage unit 228, which will typically be only a small fraction of the size of the associated BAM files, is transferred to the GSR 110 using conventional network transmission techniques.
  • FIG. 3 depicts a second exemplary implementation of a GSC 114.
  • one or more high-speed sequencing machines 302 are operative to generate sequence reads, which are then provided to an input interface 310 of a processing module 320.
  • a processor 324 operates to store the received sequence data reads along with related metadata within a storage unit 326.
  • the processor 324 executes the instructions of an encoding module 336 in order to encode each sequence read (i.e., segment of biological sequence data) stored within the storage unit 326 into a formatted biological data unit comprised of a header and a payload (such format also being referred to herein as the bIQ format).
  • each biological data unit may be representative of or contain an encoded representation of a segment of biological sequence data.
  • this encoded representation comprises a set of instructions which are at least implicitly defined relative to a reference sequence 338.
  • the header of each biological data unit may include biological or other information relating to the encoded information included within or represented by its payload.
  • this header information includes information stored within one or more layered data tables 340.
  • the header information may include DNA- related information included within one or more DNA layer tables 342, R A-related information included within one or more RNA layer tables 344, protein-related information included within one or more protein layer tables 346, or information from other layer tables 350.
  • the processor 324 stores the biological data units comprising encoded sequence information and related metadata within a file storage unit 328 and may execute an encryption module 332 to encrypt the biological data units using a key associated with, for example, a particular data transfer session.
  • the processor 324 may operate upon the sequence reads received from the input interface 310 to create biological data units substantially simultaneously with storing such reads within the storage unit 326.
  • the processor 324 further executes the instructions of a GeneTorrentTM upload client 330 to transfer the biological data units within the file storage unit 328 to the GSR 110 via a network interface 360 in the manner described below.
  • a GSC 114 may be configured to transfer, using a GeneTorrentTM upload client, either BAM files or encoded sequence information (i.e., biological data units) to the GDR 110 to enable distribution of the subject genomic information to subscriber systems. It should be appreciated that in embodiments in which the subject genomic information is encoded into biological data units at a GSC 114, an encoding process similar or identical to that described with reference to FIG. 3 may occur at the GDR 110. This approach is described below with reference to FIG. 5.
  • FIG. 4 depicts an exemplary implementation of the GSR 1 10.
  • the GSR 110 is configured to receive BAM files and related metadata from the GSCs 114. That is, in the embodiment of FIG. 4 it is assumed that the sequence reads from the sequencing machines within the GSCs 114 are not being encoded into biological data units prior to be transmitted to the GSR 110. In embodiments in which such biological data units are generated at the GSC 114, it would be unnecessary to include a similar sequence encoding capability within the GSR 110.
  • the GSR 110 includes an input interface 410 configured to receive the BAM files and related metadata transferred from a GSC 114.
  • a processor 424 of the GSR 110 executes the instructions of a GeneTorrentTM application 430 disposed to interact with the GeneTorrentTM upload client executed at the GSC 114.
  • GSR 110 includes a storage processor 425 operative to store the received BAM files along with the related metadata within a storage unit 426.
  • the processor 424 executes the instructions of an encoding module 436 in order to encode each sequence read (i.e., segment of biological sequence data) stored within the storage unit 426 into a formatted biological data unit comprised of a header and a payload.
  • the payload of each biological data unit may be representative of or contain an encoded representation of a segment of biological sequence data.
  • this encoded representation comprises a set of instructions which are at least implicitly defined relative to a reference sequence 438.
  • the header of each biological data unit may include biological or other information relating to the encoded information included within or represented by its payload.
  • this header information includes information stored within one or more layered data tables 440.
  • the header information may include DNA- related information included within one or more DNA layer tables 442, RNA-related information included within one or more RNA layer tables 444, protein-related information included within one or more protein layer tables 446, or information from other layer tables 450.
  • the storage processor 425 stores the biological data units comprising encoded sequence information and related metadata within a file storage unit 428 and may execute an encryption module 432 to encrypt the biological data units using one or more encryption keys. For example, in one embodiment execution of the encryption module 432 effects encryption using both a key associated with a particular data transfer session and a key associated with the subscriber system to which the encrypted biological data units are being transferred.
  • the processor 324 further executes the instructions of the GeneTorrentTM application 330 to transfer the encrypted biological data units within the file storage unit 428 to a GeneTorrentTM download client within the requesting subscriber system via a network interface 460.
  • FIG. 5 depicts a codec schema 500 representative of the various encoding, decoding, encryption, decryption and transcoding operations which may be effected within the data network 100.
  • the schema 500 includes an encoder 510 for performing an encode element 512 and an encrypt element 514 with respect to a file of sequence data 516.
  • the file of sequence data 516 may be of, for example, a mapped format or a variants call format (VCF).
  • VCF variants call format
  • the encoder 510 is representative of the encoding and encryption operations which may occur within a GSC 114 in a manner consistent with the present disclosure.
  • the encoder 510 may align and map sequence reads to a reference sequence and call variants. During this first stage the format of the data can be expected to be in many different formats and operated upon by several different versions of algorithms and analytical tools. In one embodiment the sequence data that is generated and processed by the encoder 510 is not yet accessible to other components of the data network 100 or to other biological networks in communication therewith.
  • each biological data unit may include a header containing information relevant to the sequence information encoded within the payload of the biological data unit.
  • the headers of each biological data unit may comprise layers of annotation and other information and may effectively function as tags for the sequence information included within the files 516.
  • Metadata may also be directly embedded with the sequence data included within the payloads of biological data units to enhance and facilitate data processing operations elsewhere within the network 100.
  • the schema 500 further includes a network-based distributor 520 configured to receive encrypted and encoded files or segments of sequence data for distribution to requesting subscribers.
  • the distributor 520 may, for example, be representative of the functionality implemented within an exemplary implementation of the GSR 110.
  • the distributor 500 includes a receive element 522 for receiving the encrypted and encoded sequence data transmitted by the encoder 510 over a network.
  • a decrypt element 524 decrypts the encrypted and encoded sequence data and provides the unencrypted result to a storage element 526 for storage within the distributor 500.
  • a retrieve element 528 cooperates with the storage element 526 to retrieve the encoded sequence information corresponding to the request or query.
  • An encrypt element 530 then encrypts the retrieved, encoded sequence information prior to transmission over a network to the requesting decoder 540.
  • this encryption is performed using a first encryption key associated with the data transfer session in which the encoded sequence information is transmitted and a second encryption key specific to the requesting decoder 540.
  • each decoder 540 includes a decode element 542 and a decrypt element 544 for decrypting and decoding, respectively, the encoded and encrypted sequence information received from the distributor 520. As a result of these operations each decoder 540 produces a file 560 of sequence data corresponding to a reconstructed version of one of the files of sequence data 516 provided to the encoder 510.
  • Each decoder 540 may, for example, be representative of the functionality implemented within an exemplary implementation of a subscriber system 120.
  • transcoder 570 having a transcode element 572.
  • the transcoder 570 is operative to add data to, or associate additional data with, the encoded sequence information managed by the storage element 526 of the distributor 520.
  • additional data may be created as a consequence of processing the encoded sequence data within the distributor 520 using analysis programs or tools provided to the distributor by the transcoder 570.
  • data may comprise new knowledge from analysis of the encoded sequence data conducted at the transcoder or new information added from network metadata analysis.
  • the results of the processing initiated by the transcoder 570 may be returned to the trasnscoder 570 for storage.
  • the transcoder 570 may, for example, be representative of the functionality implemented within an exemplary implementation of a GDAC 116.
  • the schema 500 further includes a data manager 580 configured with an entitlement element 582 and a catalog 584.
  • the entitlement element 582 receives authorization information 586 and is responsible for enforcing conditional access control throughout the network 100. That is, the entitlement element 582 regulates access to the information within the files 516 distributed throughout the network 100.
  • conditional access control effected by the entitlement element 582 is distributed among the elements of the network 100.
  • This distributed approach may be desirable in view of the nature of the sequence data and metadata being conditionally accessed during the execution of transactions involving such information.
  • data may include sensitive or other preferably private information concerning individuals associated with sequence information potentially available throughout the network 100 and throughout systems linked to the network 100.
  • a distributed approach to regulating access to such sensitive information may be advantageous since data access may be controlled at multiple points within the network 100.
  • FIG.6 illustratively represents the incorporation of a distributed conditional access system (DC AS) within the network 100.
  • DC AS distributed conditional access system
  • users on the network 100 are authenticated using a system of highly distributed conditional access points. This may involve, for example, using an encoder to perform high speed pattern matching in a manner that is consistent with the standardized compression and encryption format. The encoder is able to efficiently couple these two processes together for best compression with highest security.
  • the data may be formatted in such a way that it can be used in a standard compression and encryption format that is consistent with all GSCs approved for medical and pharmaceutical grade sequencing.
  • a distributed conditional access system may be employed for the management of access to the data within the network 100.
  • Such access may be based on, for example, a combination of qualifications including, without limitation, a consent requirement, medical or health alerts, analytical reports, updating the data with current findings and social reports.
  • conditional access of the sequence data may be effected at each and every transaction point. Development of such a common format could, for example, be based upon input provided by various agencies, individuals and institutions.
  • digital rights management will be mediated by the DCAS.
  • the general specifications of rights management could be developed to be consistent with, for example, regulatory guidelines set by a genotype and phenotype expert group or other organization. For example, such guidelines may specify those authorized to access the stream of germline variants versus those authorized to access somatic variants files.
  • One aspect of such guidelines could address an individual's rights with regard to genome sequence data, while another aspect could focus upon gene differential expression from R A-Seq data.
  • the common format will preferably be optimized to encode and encrypt this data and will provide guidelines to regulate transmission and storage of this highly sensitive data.
  • the encryption scheme should involve granularity to the extent where access to any component of the data can be filtered and regulated to the ⁇ ⁇ degree in order to enable various levels of user accessibility.
  • the disclosed system provides for the highest level of privacy by utilizing an approach to access control that is highly-distributive and easily regulated at nearly every transaction point.
  • conditional access control functionality should be present at the GSC 114 where sequence data is produced.
  • the particular GSC 114 generates genome sequences for many different research groups, consortiums, research projects, clinics, pharma and individuals and all of this data will be sent to different places.
  • the various data consumers will have different levels of access to the dataset.
  • a typical scenario might involve a case where one GDAC 116 is entitled to view all sequence variants, somatic and germline combined while another might be entitled to access somatic mutations only.
  • an encrypted content key, Key c may be generated for one set of genome sequence data files and separate subscriber keys, Key s , generated for subscribers having different levels of entitlement to access the data.
  • the data might be sent directly from a GSC 114 and post processed to a GSR 110.
  • the source of this data will require access from multiple subscribers and different types of results will be published to several orders more destinations.
  • the GSR 110 may be equipped with DC AS as a main transaction point for regulation of queries, subscriptions, publishing and function request.
  • the genome data transaction system provides a sequence data validation service which uses network-wide data coordination protocols.
  • FIG. 7 illustratively represents the incorporation of a distributed conditional access system (DC AS) within an alternative data network 700.
  • the network 700 is similar to the network 100, but includes multiple network-based genome storage repositories 110 linked to a data coordination center (DCC) 710.
  • DCC data coordination center
  • subscriber systems are disposed to query and interface with a GDAC 116 rather than with a GSR 110.
  • GDAC data coordination center
  • FIG. 8 an illustration is provided of one manner in which the encode/decode and encrypt/decrypt schema described with reference to FIGS. 1-7 may be utilized to mediate genomic-based transactions among various users of the network 100. As was described with reference to FIGS.
  • data that is presented to a GSC 114 in a BAM format or any other format capable of being encoded into the bIQ format may be efficiently transmitted to a remote location within the network 100.
  • One advantage of the biQ format is that the data can be operated upon in the compressed format, which obviates the need for conversion between a format suitable for compression and one optimized for processing and/or data security.
  • the GSC 114 receives various aliquots of highly purified analytes containing preparations of genomic and mitochondrial DNA and R A. Using the several different sequencing platforms DNA-Seq and R A-Seq data is generated.
  • the GSC 114 will generally store the raw sequence reads in the format of the platform or machine generating the reads (e.g., within BAM files).
  • the GSC 114 will also typically store the metadata for such platform or machine, information relating to the operator, the date of the sequence run, and other related information. This metadata information can be incorporated into biological data containing the compressed and encoded sequence data, which are then generally encrypted prior to being transmitted from the GSC 114 to the GSR 110 or, in other embodiments, to a GDAC.
  • the encoder device utilized in the GSC 114 may be comprised of hardware and software configured in a manner that is capable of processing BAM files at the rate of the stream.
  • the encoder preferably matches dictionary word patterns and uses a compression and encryption scheme that enables secure transmission and entitlement management of the transactions that involves this data.
  • the codec model of FIG. 5 provides a mechanism for commercial transactions involving transmission, exchange and analysis of genome sequence data.
  • a doctor that is treating a cancer patient that is a difficult case can simply order a genome data analysis report (GDA Report) using a process that is similar to ordering a blood chemistry report today.
  • GDA Report genome data analysis report
  • the doctor may order a whole-genome sequence data analysis.
  • the entire process can be medicated by the system described herein, with contractual relations involving the various entities being indicated in the outer layer of FIG. 6.
  • the workflow of FIG. 6 may be summarized as follows: • An oncologist experiences difficulty treating a cancer patient
  • Tissue sample is taken at a biospecimen core resource (BCR) facility
  • GSC genome sequencing center
  • the preprocessed is compared against other preprocessing data and metadata to insure the highest quality processing
  • GDACs genome data analysis centers
  • the analysis that is carried out at the GDAC may involve access to the patient's EMR or relevant information from EMR
  • GDACs may also have access to certain relevant drug interaction databases to generate highest quality GDA reports
  • the present approach enables a high level of data protection and coordination from the time of a doctor's decision that a patient's genome data and other molecular markers may be relevant to the treatment of the patient.
  • This scheme provides a first-in-kind mechanism to offer a genomic data electronic transaction model with state of the art entitlement management system.
  • the information that is contained in a full genome data analysis report along with information from the EMR and the various metadata can be used to populate a semantic database and linked with other data such as but not limited to research publications, off-label drug data from pharmaceutical companies, drugs in the development pipeline, upcoming drug trials, communications between experts and other such related information of any type that might be relevant to the case.
  • the organization of the various types of data will allow meaningful usefulness of the vast amount of data that can be integrated into a medical decision making process.
  • sequence data 904 is encoded/compressed into the payloads 910 of biological data units (stage 908).
  • Biological and other information 912 specific to the sequence information is used as the basis of headers 914 inserted such biological data units (stage 916).
  • each header 914 includes information relating to a different layer of a biological data model associated with the sequence information.
  • the type of information that could be embedded and interwoven with the sequence data in the form of headers 914 could include, for example and without limitation, information concerning genotype, gene expression levels, methylation, micro RNA interactions, drug response, clinical, environmental and any such relate annotation specific to the sequence files. See, for example, U.S. Patent Application Serial No. 13/223,071, entitled “METHOD AND SYSTEMS FOR PROCESSING POLYMERIC SEQUENCE DATA AND RELATED INFORMATION"; U.S. Patent Application Serial No. 13/223,077, entitled “METHOD AND SYSTEMS FOR PROCESSING POLYMERIC SEQUENCE DATA AND RELATED INFORMATION"; U.S. Patent Application Serial No.
  • analysis may review new variants risk correlations data, or drug efficacy and response data.
  • the former it may be useful to have that layer of information packaged with the sequence data because of the specificity and pertinence as well as this might be information that is referenced regularly.
  • the latter it might be more reasonable and efficient to include the detailed drug data as well as other drug relationships in a linked drug database.
  • a content encryption key (Key c ) 920 is generated based upon the content of the data and a subscriber key (Key s ) 924 is separately generated for each of the authorized users that have permission to access the data.
  • the Key c may be derived from a package of the header 914 and the sequence data of the biological data unit 930 being transferred (e.g., the sequence data included within the received BAM or VCF file).
  • the biological data unit 930 comprised of the header 914 and payload 910 is encrypted using the Key c (stage 934) and is further encrypted using the Key s (stage 938).
  • the encrypted biological data unit 930 and public content key Key c are transmitted from the GSC 114 to the GSR 110 and/or GDAC 116, and subsequently to a user of a subscriber system 120 (e.g. to a researcher, doctor, patient, etc.).
  • a biologically-intelligent nucleic acid sequence compression data format capable of being used in, for example, the bIQ network described above with reference to FIGS. 1-9.
  • this data format is specifically designed for highly efficient compression, processing, movement, transmission and security of large volumes of DNA and RNA sequences.
  • a dictionary approach is used to generate a reference sequence and to then determine the delta between this sequence and the sequence(s) being compressed.
  • biological knowledge is integrated into the compression scheme using operation codes. For example, insertions and deletions that may represent thousands of bases can be represented by a single opcode instruction.
  • the bIQ format disclosed herein and in the co-pending patent applications referenced herein facilitates the integration of knowledge concerning a sequence into its representation in order to improve compression and meaningful processing of the data. For instance, a base at any given position in a sequence can be substituted by any of the other three bases. However, in every case of a base substitution one of the 3 options has a significantly different biological impact than the other two.
  • the bIQ network facilitates the transmission of, for example, the sequence data generated by DNA and R A sequencing processes. These sequencing processes generate files of various file formats including, for example, the BAM, CRAM and VCF format. In one embodiment the bIQ network is capable of receiving sequence data in any of these file formats.
  • Sequence Alignment/Map (SAM) files are the precursors of BAM files, which are essentially a binary version of SAM files.
  • the SAM file that is generated from sequencing run is a TAB-delimited ASCII format consisting of an optional header section and a telemetric sequence data section for the raw read sequences streaming from the sequencing machine.
  • the header information that is associated with BAM files is typically attached at the head of the sequence data.
  • the lines in the header start with a '@' sign, while alignment lines do not.
  • '@HD' is usually the first line in the BAM files to indicate the start of the header lines in the file.
  • the '@HD' line of the header will usually have an information field for the version number of the file format being used (VN) as well as the sorting order of the alignments (SO).
  • VN version number of the file format being used
  • SO sorting order of the alignments
  • the coordinates for alignments are keyed and sorted by the reference sequence name field (RNAME) as well as the base position field (POS).
  • the next set lines in the BAM header are usually the lines that represent the reference sequence dictionary which are the lines that contain the information that defines the alignment sorting order of the BAM file. These lines are indicated by a '@SQ' line. Each of these lines has six information fields.
  • the first field in the @SQ line is the (SN) which is the field that contains the reference sequence name.
  • SN is the field that contains the reference sequence name.
  • Each line in the file should have a different identifier for this field.
  • This is an information field in the header of BAM files that is used in the alignment record in RNAME next position (PNEXT) fields which is a major coordinate sort key.
  • PNEXT RNAME next position
  • X, Y and Mito are some of the tags that are used in this field.
  • the balance of the information fields in the @SQ line include the reference sequence length (LN), the URI for the sequence file (UR), the identification of the genome assembly that was used (AS), the MD5 checksum without spaces (M5) and the species that the sequence maps to (SP). It is interesting to note that Epstein-Barr virus is one on the species sequenced in the current example.
  • next line in the header is the read group indicated by '@RG' which includes several information fields. Much of the sequence machine metadata can be associated with these header lines.
  • these lines include an identification number (ID). If there are multiple read group lines in the BAM file header then each line should have a unique id number.
  • the @RG line includes the sequencing technology or platform (PL) that was used to generate the sequence. This may include but is not limited to Illumina, SOLiD, IONTORRENT, PACBIO and others.
  • the platform unit (PU) is a unique identifier for the actual unit used.
  • the reference sequencing library that is used to calibrate the analyte concentration is found in the field for the library is denoted by LB and the date as well as the time of the run by indicated by DT.
  • the sample identifier and the genome sequencing center are by SM and CN, respectively.
  • the program lines in the header '@PG' contain the information fields for the program identification field (ID) in the program lines. Multiple program lines may exist in the BAM header and each would require a unique program ID.
  • the program name (PN) command line (CL) and the version number (VN) fields might be included on this header line.
  • nucleic acid sequence information there are a number of considerations relevant to the compression of nucleic acid sequence information including, without limitation, footprint, processing feasibility, efficient movement between memory elements, transmission or network and security.
  • CRAM is a new and efficient method for raw DNA sequence data storage using reference-based compression.
  • This reference sequence based compression technique would likely be suitable and sufficient if sequence variation were limited to single nucleotide polymorphisms. In that case, all sequence entries would be identical length and compression, multiple sequence alignments, comparative sequence analysis and processing would be a lot easier to handle.
  • the CRAM method uses a reference for compression, it should be appreciated that the reference is suboptimal in that it is only used to compress on the order of 70% of the generated sequence reads. Moreover, the algorithm is lossy in that some read sequences are not compressed or encoded whatsoever.
  • VCF Variant Call Format
  • VCF Variant Call Format
  • VCF files are usually stored in a compressed format that can be indexed for fast and efficient random access to data when retrieving information on variant alleles from any position on the reference genome.
  • VCFtools In order to interrogate these files, a stack of software called “VCFtools” is used to implement various utilities for processing including, for example, for slicing, merging, inter-leaving, performing format validation, comparing, annotating and performing basic statistical correlations.
  • VCFtools and the genome analysis toolkit (GATK) developed by The Genome Sequencing and Analysis Group (GSA) in Medical and Population Genetics at the Broad Institute also provide a general Perl and Python API.
  • the VCF file is comprised of a header and a body section. Both file types are reference-based, which is instrumental for navigating the base sequence data. However, whereas the focus of BAM files is to capture a substantial amount of information concerning the sequencing of a sample, the VCF file concentrates on the differences between the reference and sample sequence.
  • the header is flexible and extendable with regards to the type and amount of metadata it contains. VCF files are highly-annotated to the extent that they may apply to a particular variant, as a whole or to each genotype. In addition to genotypic annotations, others that are commonly used may include filters, genotype quality score, genotype likelihoods, dbSNP membership, haplotype data, ancestral allele, mobile element information, read depth, mapping quality and other such related information.
  • FIG. 10 illustrates a comparative sequence analysis process 1000 used to minimize apparent biological differences between a reference and a sample sequence entry.
  • a source database is selected having sequence entries all within the same species.
  • one entry within the database is selected (stage 1020).
  • the biQ compression algorithm is then executed using by applying the reference sequences against the source database (stage 1030).
  • stage 1040 A dictionary compression scheme is then executed in order to identify features which may be used to update the selected reference sequence and thereby enable higher compression of the sequence entries (stage 1040).
  • stage 1040 may involve executing the compression algorithm to create a variants profile for each of the entries within the database and analyzing the resulting variants file. Such an analysis could include, for example, determining if the majority of the entries within the database have the same sequence polymorphisms.
  • the selected sequence entry may have a nucleotide base that is an "A" at a particular location, but the majority of the entries may instead have a "G" at the specified location.
  • the resulting variants data would indicate a transition instruction at that location (as opposed to a transversion which would result in a T or C substitution).
  • the selected reference sequence is updated with the result of the data analysis described above. For example, in the scenario described above a "G" would be placed at the specified position.
  • stages 1020, 1030 and 1040 are repeated until it is determined (in stage 1050) that further updating of the reference sequence is unlikely to yield further improvements in compression. This may be determined by, for example, comparing the current reference sequence to the dictionary entries and determining whether any changes to the reference would enhance compression performance. That is, the reference sequence will essentially be reduced to a sequence having a minimum number of mutations or structural variants.
  • modifications may be made to the type of information that is collected and maintained in the headers of these sequence files (e.g., BAM and VCF sequence data formats).
  • the sequence that is used to calibrate the data need not be selected from one of the entries. It could simply be generated or initially assigned by looking at the common entry for each of the positions. For example, if at position 100 more than 50% of the entries have a C then the reference should have a C at that position. In order to develop the minimum reference sequence, substitute a C for recursive optimization of the ideal sequence used for referencing. Doing this for the most common variants would find that the ideal minimum sequence would generate a highly-compressed database of mapped and unmapped raw reads.
  • Two sequences that are compared have similarities and differences that can become intimately involved in operation coding of DNA sequence data.
  • one sequence as relates to the other allows for one entry to serve as the control reference sequence. This provides an opportunity to use this method to compress the relative differences using biological instructions.
  • FIG. 11 a flowchart is provided of an alternate encoding and encryption process 1100 capable of being employed within the network 100.
  • the process 1000 employs the dictionary compression and reference sequence modification techniques described above.
  • sequence reads are received from a next-generation sequence machine.
  • An optimized reference sequence is then generated from these sequence reads (stage 1120).
  • a dictionary is created (stage 1130).
  • biological data units are encoded, assembled and stored within a GSR (stage 1140).
  • the stored biological data units are then encrypted (stage 1150) prior to being transferred to a subscriber system (stage 1160).
  • deletions or insertions can be applied to the selected minimum reference sequence as an updated version for improved compression.
  • a premature termination codon PTC
  • a specific control reference sequence based on a minimum delta value may be selected, and then a dictionary may be generated from the resulting dataset. For example, all the minor variant alleles in BRCAl gene (not limited to any one gene) that correlates with all known clinical and pharmacological effect can be used in a dictionary scheme.
  • Each mutation event within each sample entry that results in a phenotypic effect, as well as silent mutations that are common in several entries, can be placed in a dictionary using this approach for further compression of the sequence data.
  • the algorithm is able to take advantage of specific difference values from the references that are common to multiple entries.
  • sequence files generated by a GSC 114 may be securely transferred to the GSR 110 in parallel fashion through the GeneTorrentTM data transfer application.
  • this application is instantiated as the GeneTorrentTM application 430 installed on the GSR 110 and the GeneTorrentTM upload client 230 installed on a GSC 114.
  • the GeneTorrentTM application 430 cooperates with a GeneTorrentTM download client installed on a subscriber system 120.
  • GeneTorrentTM upload client 230 cooperate to effect submission of a set of one or more sequence data files (e.g., BAM files) to the GSR 110.
  • effecting such a submission involves adding the submission to one or more catalogs maintained by the GSR 110 and/or DCC 124, verifying the associated metadata to be uploaded, storing and indexing the metadata for search, storing the sequence data in replicated persistent storage within the GSR 110, and setting access rules based on, for example, consent agreements associated with the tissue samples from which the sequence data files are derived.
  • GeneTorrentTM download client within a subscriber system 120 cooperate to retrieve a bundle of one or more sequence data files from the GSR 110.
  • retrieving a sequence data file from the GSR 110 includes verifying the requesting user is authorized to view the data within the file, storing the sequence data in local persistent storage at the subscriber system, and verifying that the transfer was performed correctly.
  • the actual transfers of the sequence data files are preferably authenticated (i.e., only users associated with the appropriate permissions relative to the file may access its sequence data) and authorized (i.e., only users authorized in view of project- specific or other rules maintained by the GSR 110 and/or DCC 124 are permitted to download the identified sequence data file).
  • Such transfers are also preferably secured in that the sequence data is strongly encrypted when transiting the network and reliable (i.e., files may be presumed to have been transferred essentially intact and uncorrupted unless the GeneTorrentTM application provides an indication to the contrary).
  • each GeneTorrentTM client provides a command line interface to the end user. Through this interface one of two operating modes typically may be invoked: upload and download. When operative in upload mode, the GeneTorrentTM client operates in concert with the GeneTorrentTM application 430 to upload files to the GSR 110. When operative in download mode, the GeneTorrentTM client and the GeneTorrentTM application 430 cooperate to download files to the client from GSR 110. In addition, the GeneTorrentTM application 430 may enter an "actor" mode during which multiple GeneTorrentTM server instances are created for use in performing parallel transfers to/from the GSR 110.
  • 430 executes on one or more application processors to manage file transfers to from GeneTorrentTM clients at GSCs 114 and to/from GeneTorrentTM clients at GDACs 116 .
  • multiple GeneTorrentTM server processes executing on the application processors listen for download requests, and multiple GeneTorrentTM upload actor instances are spawned when an upload request is received from a GSC 114 (or, in certain cases, from a GDAC 116).
  • application server instances (“AppServer Instances") executing on the application processors may be configured as either GeneTorrentTM upload actor instances or GeneTorrentTM download actor instances.
  • the allocation of AppServer Instances among GeneTorrentTM upload and download actor instances may be made in accordance with, for example, the number and type of upload and download requests received from peer GeneTorrentTM instances at the GSCs 114 and GDACs 116. For example, during periods in which a higher number of download requests are received from GDACs 116 relative to the number of upload requests from GSCs 114, more of the AppServer Instances executing on the application processors may be configured as GeneTorrentTM download actor instances. Conversely, more of the AppServer Instances executing on the application processors may be configured as GeneTorrentTM upload actor instances during times in which a relatively larger number of upload requests are received.
  • the system dynamically load balances across the application processors to allocate capacity for multiple upload and download processes, allowing it to better respond to the normal fluctuations in GSC and GDAC workflows. Moreover, performance with respect to a particular GeneTorrentTM upload or download session may be enhanced by allocating a relatively larger number of GeneTorrentTM actor instances to such process.
  • Analysis objects are the primary container for submitting and downloading sequence data.
  • Each Analysis object may include one or binary sequence Alignment/Mapping (BAM) files and is associated with an XML metadata file.
  • the payload of each BAM file contains both the sequencing data (in bases, quality scores, and read names produced by the sequencing instrument) and read placements with annotations about strand, alignment, and quality features.
  • Raw sequence read files such as .srf files, can also be submitted along with the BAM files.
  • each data submission includes a file of submission metadata compliant with the SRA 1.3 XML schema.
  • a user When making a new data submission a user will create and save a user authentication key via an authentication Web page hosted by or in association with the GSR 110.
  • the user may then invoke an application executed by the GSC 114 to create a unique identifier (UUID) to associate with the Analysis object. Assigning a UUID to the Analysis object ensures that the submission can be subsequently uniquely identified relative to all other submissions provided to the GSR 110.
  • the user may then create a directory at the GSC 114 and copy the XML metadata file (e.g., "analysis.xml") and sequence data files relating to the Analysis object into the directory.
  • sequence data files may include additional files of type other than BAM, such as legacy formats or proprietary formats containing raw read data.
  • the RNA-seq raw read data could be submitted along with the alignment data in the BAM.
  • these additional files will be uploaded, stored and downloaded along with the BAM file as part of the same Analysis object.
  • the GSR 110 maintains a list of users permitted to upload new submission sequence and metadata. This list may be maintained by, for example, an out-of-band interaction between personnel representing each GSC 114 and operations staff of the GSR 110.
  • sequence data may be further constrained by applicable project consent authorization constraints. For example, consents from owners of sequence data relating to those users eligible to download such data may be received by the GSR 110 in one or more files on a regular (e.g., daily) basis.
  • the GSR 110 may then update one or more internal authorization tables to reflect any changes.
  • each file of sequence data within the GSR 110 is associated with a project coordinated by the DCC 124 through the identifier (e.g., UUID) assigned to the biospecimen from which the sequence data file was derived.
  • the GSR 110 may receive this tag as part of the sequence data submission process.
  • the GSR 110 may then confirm with the DCC 124 that the identifier is valid.
  • the DCC 124 may also provide information on whether the sample has been redacted.
  • uploading of a new submission of sequence- related data generally involves several operations.
  • the user at the applicable GSC is authenticated and the submission "package" of files to be uploaded is validated.
  • the Analysis object with associated metadata is added to a repository catalog associated with one or both of the applicable DCC 124 and the GSR 110.
  • the set of one or more sequence data files included within the submission package are then transferred to the GSR 110.
  • the correctness of the transfer may then be verified, and its legitimacy may be confirmed with reference to information maintained within the DCC 124.
  • the upload process is then generally concluded by setting appropriate authorizations for access to the information within the new Analysis object.
  • a user will typically transfer a plurality of files related to sequencing of a sample to the GSR 1 10.
  • these files which are all associated with the same Analysis object, may include one or more XML files containing metadata about the sequence data files of interest.
  • the Analysis object may, but need not, also include one or more sequence data files (e.g., BAM files) associated with the metadata.
  • the GeneTorrentTM upload client 230 will first pass the XML metadata files of the Analysis object to the GSR 110, where consistency checks and other types of validation will be performed. During this stage all necessary validation is performed in order to ensure that the metadata and BAM file headers are complete and correctly formatted.
  • the GSR 110 will validate the structural metadata required to identify and manage the sequencing data and may also perform any project- specific validation rules required to ensure consistency between the metadata and BAM headers.
  • a metadata client module at the GSC will generate a manifest.xml file that can be passed to the GeneTorrentTM client 230 for use in uploading the sequence data files of the Analysis object to the GSR 110.
  • a complete error log will be returned with descriptive errors to help isolate the failures.
  • the GeneTorrentTM client 230 will locate all of the sequence data file(s) (e.g., BAM file(s)) listed in the analysis. xml file within the directory created during the submission stage.
  • the GeneTorrentTM client 230 will connect to an API provided by the GSR 110 and pass a GeneTorrentTM object file ("GTO), which is used by a GTO ExecutiveTM subsystem to initiate the upload.
  • GTO GeneTorrentTM object file
  • the GTO ExecutiveTM subsystem will identify the address of the upload user and generate the required digital certificates.
  • the GTO ExecutiveTM subsystem will spawn multiple GeneTorrentTM upload actor instances, which will begin uploading a first of the one or more sequence data files listed in the analysis. xml file.
  • the GeneTorrentTM upload client 230 then segments the file and begins parallel file transfer sessions of the file pieces over SSL.
  • the GeneTorrentTM protocol will manage transmissions errors on any of the file pieces and will reassemble the file at the GSR 110.
  • the GSR 110 will perform a series of validation steps prior to making the data available for download.
  • these steps may include, for example, computing the MD5 checksum and comparing it against the value in the XML metadata file, verifying the name of the transferred sequence data file matches the name in the XML metadata file, and validating that the headers of the transferred sequence data file match the header information in the XML metadata file.
  • the DCC 124 will be queried to determine if the sample is valid and is in an active state (e.g. has not been redacted). If the sample cannot be found, the state will be set to "verifying sample”. If the sample is found, but has been redacted, the state will be set to "suppressed”. In both cases, the GSR 110 will periodically poll the DCC 124 to see if the state has changed.
  • a two-phase process is used to download the biological data units of files associated with Analysis objects within the system 400. Namely, during a first phase one or more sequence files of interest are identified, and during a second phase the biological data units associated with the identified sequence files are transferred from the GSR 110 to a subscriber system 120 and/or GDAC 116 for storage. For each Analysis object, the GeneTorrentTM file transfer application 430 will coordinate retrieval of related metadata from the metadata database 512 during the first phase and the biological data units of all associated sequence data file(s) from the GSR 110 during the second phase.
  • a user may issue a metadata-related to query to the GSR 110.
  • queries are directed to the DCC 124.
  • the user may specify values for one or more metadata attribute fields within the query.
  • the GSR 110 may respond with zero, one, or more URIs referencing Analysis object(s) having metadata matching the specified attribute values.
  • the URIs may be passed to a GeneTorrentTM download client at the subscriber system 120 or GDAC 116 for storage .
  • the GeneTorrentTM download client 524 interacts with at least the GeneTorrentTM application 430 to transfer the identified sequences.
  • optional validation checks are performed by the GeneTorrentTM download client to ensure proper download and content format.
  • the above -referenced content-aware bIQ network provides a system to partition all of the different types of data in such a way that is functionally consistent with the way that it is done currently.
  • a network may also be further configured to facilitate tracking, integrating and coordinating (e..g, from birth) substantially all of a person's relevant electronic health information including next-generation genomic and other omics data from highly distributed databases in a single step.
  • a doctor with access to the content-aware bIQ network uses one integrated system that is capable of monitoring and coordinating all of these different data types.
  • the process of coordinating the data is obviated by the content-aware network.
  • it may currently require several months to institute desired changes to a file containing genomic sequence data (e.g., an update to the header of a BAM files at a data coordination center).
  • the not-yet-coordinated data sits in a staging area and not accessible to interested users at a GDAC.
  • the bIQ network enables coordination of networked genomic data in a number of different ways. For example, changes to a reference sequence, or modification of the format that is used to store and transmit the sequence data, can be easily facilitated by the bIQ network.
  • a network user with relevant algorithms at a GDAC may wish to send a query to find of those subjects with the ApoE marker how many had been treated with a particular drug for a different illness involving overlapping biological pathways. This might be an off- label drug that could be highly effective for treating certain type of stage of Alzheimers.
  • the metadata that is available on the network should be made useful in making statistical corrections to determine confidence in finding any correlations can be made with MCI scores or brain images (MRI, PET, etc.). All of this data will be distributed across the network and results are aggregated to publish a result.
  • Another level of correlation of this data may exist when DNA and RNA are prepared at various BCRs by different technicians and sequenced at different GSCs on different platforms and mapping and variants calling done by different tools correlations analysis can be done to establish a standard of quality. For example, are certain machine errors increased at a certain GSC at certain times the day or when a particular technician is working.
  • Correlations can be done on essentially any on data point available on any individual. For example, if enough data was available on the network it would be reasonable to extract meaningful correlations from nutritional, environmental and other such data with genomic sequence data.
  • data that is stored on the bIQ network is partitioned a manner that is consistent with maintaining the highest level of privacy of data.
  • the network may be configured to permit individuals to be able to give dynamic consent to anyone requesting access to their molecular expression and genomic sequence data that is kept at a GDR.
  • an individual's data might be stored at a GDR and each query request for access to that particular set of files would alert the owner of the data (the patient).
  • the owner can grant access to the data using several different bIQ network compatible devices including but not limited to a cell phone.
  • Privacy is also enhanced by the manner in which the relevant data will be compressed and encrypted for transmission and to facilitate other transactions. For example, certain data that is intended to stay private can be encrypted and compressed in a manner that is consistent with generating different levels of privatized genomic variants data.
  • data on the network can be accessed and processed by moving applications to the stored data rather than by moving the data from storage or otherwise copying the data.
  • data can be accessed or information about the data can be conditionally accessed by network queries by authorized users.
  • the privacy of the data can be controlled, partitioned and filtered based on many features including but not limited to the type of the variant SNP versus indels versus copy number variations versus chromosomal rearrangements.
  • alternative splicing variants, triplet expansions, repeat sequence, methylation profile and other related types of modification or variants data may reveal non- obvious genotypic or phenotypic information that should be kept private.
  • the bIQ network may be configured to permit a specific given set of minor alleles to be accessible to one set of users and but not to other users. There may even exist a scenario where certain regions of the genome are requested by the genome owner and/or subject to remain private from everyone including the owner and/or subject.
  • a mechanism is created to coordinate the validation process.
  • Such a mechanism would involve a means to synchronize the sequence data content, information in the header, and the various sources of metadata collected at the various steps in the work-flow of the molecular data.
  • the data that is generated at a BCR is stored in files with metadata information that relates directly to the type of biological specimen that is being used; organ type, tissue type of cell type for example.
  • metadata information that relates directly to the type of biological specimen that is being used; organ type, tissue type of cell type for example.
  • the particular specimen is given a unique barcode identification and aliquots are made and used to prepare purified DNA and or R A sequences.
  • Raw sequence reads are generated from the sequencing machines are mapped to a reference as BAM files.
  • these alignment files also contain their own header information as a part of the format that is validated during ingestion into the bIQ network.
  • invalid sequence data is not uploaded from the GSCs and therefore not included in data analysis at a GDAC.
  • a straightforward validation process is utilized; namely, files that are not consistent with the standard encode format will not be ingested.
  • the bIQ network accommodates only properly formatted and encrypted files for transactions.
  • TCP transmission control protocol
  • a "peer-to-peer” network of computers harnesses the bandwidth and computational power of the computers participating in the network. This contrasts with conventional "client-server” approaches, in which computing power and bandwidth are concentrated in a relatively small number of servers.
  • Such peer-to-peer networks may facilitate the transfer of files through a set of connections established between participating peers.
  • BitTorrent is a popular file distribution program currently used in peer-to-peer networks.
  • a peer within a BitTorrent system may be any computer running an instance of a client program implementing the BitTorrent protocol.
  • Each BitTorrent client is capable of preparing, requesting, and transmitting any type of computer file over a network in accordance with the BitTorrent protocol.
  • BitTorrent is designed to enable distribution of large amounts of data without consuming correspondingly large amounts of computational and bandwidth resources.
  • a BitTorrent peer To share a file or group of files, a BitTorrent peer first creates a small file called a “torrent” (e.g. "Filename.torrent").
  • the torrent file contains metadata about the files to be shared and also includes information about a component, termed the “tracker", that coordinates the file distribution.
  • Torrent files are generally published on a website or other accessible network location.
  • the tracker maintains lists of the clients currently participating in the torrent.
  • a peer desiring to download a file of interest must first obtain a copy of the corresponding torrent file and connect to the specified tracker. The tracker then informs the peer from which other peers pieces of the file of interest may be downloaded.
  • the peer distributing a data file generally treats the file as being comprised of a number of identically-sized pieces, usually with byte sizes of a power of 2, and typically between 32 kB and 16 MB each.
  • the peer creates a hash for each piece, using the SHA-1 hash function, and records the hash value in the torrent file.
  • the hash of the piece is compared to the recorded hash to test that the piece is free of errors.
  • Peers that provide a complete file are called "seeders”, and the peer providing the initial copy of the file may be called the "initial seeder”.
  • torrent files include an "announce” section, which specifies the URL of the tracker.
  • Torrent files also include an “info” section, which contains suggested names for the files, their respective lengths, the piece length used, and a SHA-1 hash code for each piece. This information is used by requesting peers to verify the integrity of the data received.
  • the tracker maintains records of which peers are “seeds” (i.e., a peer having the complete file(s) being distributed) and of the other peers in the applicable "swarm” (i.e., the set of seeds and peers involved in the distribution of the file(s)). During the distribution process peers periodically report information to the tracker and request and receive information concerning other peers to which they may connect.
  • seeds i.e., a peer having the complete file(s) being distributed
  • the applicable "swarm” i.e., the set of seeds and peers involved in the distribution of the file(s)
  • Users interested in obtaining a file or files using BitTorrent may, using a web browser installed on a local machine, navigate to a website listing the torrent and download it. Once downloaded, the torrent may be opened in a BitTorrent client stored on the local machine. Once the torrent is opened, the BitTorrent client establishes a connection with the tracker. At this point the tracker provides the BitTorrent client with a list of peers currently downloading the file or files of interest.
  • BitTorrent client happens to be the first such client interested in a file associated with a torrent, for at least some period of time such client may be the only peer within the swarm and thus connects directly to the initial seeder and requests pieces of the file. As other peers join the swarm, the peers exchange pieces with each other in addition to downloading pieces from the initial seeder.
  • the disclosed GeneTorrentTM high-speed file transfer system utilizes a tracker to enable a plurality of peers to cooperatively distribute a file of interest.
  • the GeneTorrentTM system incorporates a Transactor which is integrated within or otherwise operates in conjunction with the tracker.
  • the Transactor is a program which operates to immediately identify and make a record of those clients (i.e., actors) which request a certain file of interest (e.g., "file X").
  • the Transactor will also generally be configured to determine the authentication and entitlement of each actor based on authorization rules and using a secure key distribution scheme.
  • the Transactor clusters individual actors which have requested file X into a cast of participating actors comprising an affinity group.
  • the Transactor may determine which actors are assigned to a particular cast based upon, for example, the file requested, the location of the file (i.e., with which actor(s) the file is currently stored), as well as the credentials of the actors requesting access to the file.
  • the actor exchanges messages with other actors within the cast in order to determine and receive the portions of the file of interest currently possessed by the cast.
  • the Transactor proactively directs a requesting leecher actor to a feeder affinity group such that the leecher receives as much of the requested file as possible without, to the extent possible, incrementing the burden on the seed of file X.
  • the GeneTorrentTM approach effectively "parallelizes" the transfer of file information and reduces the burden on the initial seed or seeds of file X. Moreover, the use of parallel streams within the GeneTorrentTM system minimizes the effect of a multiplicative decrease in the speed of any one stream resulting from the characteristics of TCP discussed above. Thus, use of the GeneTorrentTM approach may reduce the likelihood of bottlenecks developing around overburdened seed servers in connection with the transfer of very large data files.
  • one major rate limiting step involves the ineffectiveness on the part of the research community to make decisions as a group to set the highest standards for the genomic data space. For example, it may be particularly important to develop standards around the quality of service that is used to touch genomic, transcriptomic, proteomic and other large volumes of omics data. Moreover, this type of biological data will typically require extreme security considerations. The dataset might contain genotypic and phenotypic information that could have profound effects on an individual if it is breached.
  • GTO GeneTorrentTM Object
  • user- level authentication and dataset authorization is performed before peers can initiate a GeneTorrentTM transfer.
  • a GeneTorrentTM peer desiring to initiate a transfer first contacts a control component (hereinafter also termed a "GT Exec") on a GeneTorrentTM repository and passes the user credentials.
  • the GT Exec authenticates that the credentials have not expired and correspond to a known user.
  • the GT Exec may then further verify that the user is authorized to perform the requested action (e.g., upload or download) on the specific data files identified in the request.
  • GeneTorrentTM enables multiple sending actors to transfer file pieces to multiple receiving actors over parallel streams.
  • parallel M:N transfers avoid many of the bottlenecks that occur in 1 : 1 transfers, such as issues with disk I/O, CPU utilization, large bandwidth-delay products in the WAN, and other side-effects of transferring very large data sets. Error detection and error recovery are built in, automatic and very robust.
  • the protocol is content-agnostic, allowing data file formats to evolve without impacting the underlying transfer mechanisms
  • the protocol scales asymmetrically - M:N transfers for high volume producers and 1 :N downloaders for the periodic user are supported by the same application.
  • the protocol is capable of saturating the available network bandwidth and reacts well to dynamic changes in the congestion levels in the transport network
  • the GeneTorrentTM protocol is capable of rapidly and efficiently transmitting large biological sequence data files.
  • a dynamic encryption key distribution system is integrated into the file transfer system to faciliate secure transfers. This allows for encryption of data in multiple layers that can be controlled using a hierarchical entitlement scheme.
  • one GTO file can be encrypted in a format that allows for multiple downloaders to access different layers of data from the files.
  • FIG. 12 provides a high-level of the architecture of a GeneTorrentTM system configured to form multiple instances of a GTO file so as to enable a cluster of servers to tranfer parallel streams of file information to a user system.
  • FIG. 12 integrated within or layered "on top of the architecture is a higly secure encryption system.
  • an actor first locates a Torrent file describing the target data as an initial step in participating in a GeneTorrentTM parallel file transfer.
  • a Torrent file may comprise a static "bencoded" dictionary including the Announce URL, an info dictionary, and other optional fields.
  • GeneTorrentTM uses dynamic one-time Gene Torrent Object files to bootstrap a secure and encrypted file transfer based on bi-directionally authenticated SSL sessions.
  • the Torrent file will generally be structured in order to accommodate the efficient transfer of very large files.
  • the task of generating the SHAl hashes for all the "pieces" of a very large file would be computationally expensive and impose an unnecessary I/O burden on the local storage system.
  • one or more seeders cache the torrent data for reuse.
  • Each large data file will have an associated static Torrent file which will be stored in the same directory.
  • This torrent file may comprise a "normal" Torrent, i.e., it may lack SSL certificate information.
  • certificate information and any other additional data fields may instead be dynamically inserted into the Gene Torrent Object file at the time of a download request, thus creating a one-time -use Torrent with authentication keys.
  • the Transactor at least partially enables a GeneTorrentTM system to transmit a file of interest in multiple parallel streams to a requesting entity.
  • the Transactor clusters individual actors which have requested file X into a cast of participating actors comprising an affinity group.
  • the Transactor may determine which actors are assigned to a particular cast based upon, for example, the file requested, the location of the file (i.e., with which actor(s) the file is currently stored), as well as the credentials of the actors requesting access to the file.
  • the actor exchanges messages with other actors within the cast in order to determine and receive the portions of the file of interest currently possessed by the cast. That is, a requesting leecher actor is proactively directed to a feeder affinity group such that the leecher receives as much of the requested file as possible without, to the extent possible, incrementing the burden on the seed of file X.
  • FIGS. 13-18 illustrate exemplary operation of one embodiment of a Transactor.
  • Actor 1 makes a first request to the GeneTorrentTM network for file X.
  • the GeneTorrentTM network for file X.
  • the only copy of file X is stored at the Repository.
  • the Transactor locates the actor(s) hosting file X on the network after authorization of actor 1. Since Transactor has entitlement rights Actor 1 is assigned to the Cast X cluster. At this moment Actor 1 is the only actor in the Cast of X. Actor 0 prepares a GTO file and starts sending random pieces of the file X to Actor 1.
  • a third actor makes a request for file X, is assigned by the Transactor to the appropriate cast, and begins downloading those instances of file X that are among the pool of actors in Cast X.
  • the Transactor is thus able to direct each actor to a related cast of actors so as to not overburden the original source of file X. That is, the Transactor directs leechers to a feeder affinity group in order to obtain those portions of a file of interest available from the group without chokepoints.
  • file X could be a file in multiple locations when the request is made to download this file on the network.
  • the GeneTorrentTM system can achieve multiple instances of the same file because of the key distribution used to certify copies of file X that it is from one original file.
  • GeneTorrentTM can generate multiple instances of secure parallelized streams from a certified copy of file X from one or more actors to one or more actors.
  • the line of authentication can be to on original copy.
  • the Transactor adds the data certification on top of a "smart-tracker” that tracks not only who have which file but also tracks biological and clinical knowledge about the files (Biolntelligence).
  • the SmartTracker may track file specific information contained in these sequence data files on variants, gene expression, copy number variations as well as any disease that might be associated.
  • the Transactor uses the SmartTracker, conditional access control and a robust encrypt key distribution to assign high affinity actors to a cast based on file X request and essentially on any field of information contained in the sequence data file.
  • Transactor in addition to Transactor assigning actors to a cast because they are all interested in a particular file X, the actors might be clustered based on information about the file.
  • the file X is the genome sequence for an individual with disease Y and if it is known that mutations in certain genes on chromosome 17 are associated with the disease then Transactor can be more effective in building out a well-defined affinity cast in the early stages of an impending transmission request load to limit any bottleneck.
  • the GeneTorrentTM protocol provides security for biological sequence data in transit by running a well-established protocol over Secure Socket Layer (SSL) connections between the trusted GeneTorrentTM actors involved in the transfer of file pieces on the bIQ network.
  • SSL Secure Socket Layer
  • the SSL connections will be bi-directionally authenticated in the manner described below.
  • the GeneTorrentTM client software runs on both the source system(s) and the Genome Data Repository.
  • the web service interface (WSI) and Tracker run only on the repository systems and mediate the file transfers.
  • the first step is for an exchange of digitally signed certificates to take place.
  • the uploading source and the GDR have mutually authenticated by exchanging digitally signed certificates that can be traced to a trusted 3 rd party, i.e., an Internet CA.
  • the certificates are specific to this Gene Torrent Object file and the file it represents, is immune to a replay attack, and is not subject to man-in-the-middle interception.
  • the SSL connections will use the AES-128 cipher, which is a more robust (and FIPS- compliant) cipher than the RC4 cipher typically used.
  • SSL and the necessary certificate management is a novel and key advantage of GeneTorrentTM over public solutions.
  • FIGS. 20A-20B provide an illustration of a secure GeneTorrentTM download workflow between the client-side GeneTorrentTM data consumers and the server-side WSI/Data Manager at GDR, Tracker and GeneTorrentTM actors.
  • the network flow data that is available on the system can provide powerful statistical correlation data from comparative sequence data analysis. Consider a case where sequence variants data that is transmitted from various GSCs is monitored for quality assurance. Furthermore, the Tracker might be configured to track pieces of a .gto file to control duplication and distribution of this data.
  • the proposed protocol will be able to scale to accommodate multiple server side GeneTorrentTM processes and download requests will be load balanced across processes to optimize server performance.
  • the Load Balancer module will talk to the WSI over a specified network interface to receive GTO files for each download session. It will then place the files in the appropriate GeneTorrentTM Peer work queues based on system load and quality of service.
  • the Genome Data Repository will maintain a database will full access logs (what files are uploaded, downloaded and modified by whom) and usage statistics (average transfer volume and rates, error rates, etc.). These will be managed by the Data Manager process using status from the GeneTorrentTM Tracker database. Users will access the data using standard database query and reporting tools and an administrative Web console may also be provided.
  • Search & Browse Tools Users will use a 3 rd party tool (e.g. DCC Data Portal), Web Browser and/or query scripts to search the metadata and find objects for download.
  • GeneTorrentTM Client Provides a CLI for secure, high-performance upload and download. Only download functionality will be integrated with the WSI for the POC; Basic file upload will be provided in GeneTorrentTM clients and server processes for POC testing purposes. The client runs on POSIX workstations with sufficient storage and performance and will be installed at customer sites (GSCs / GDACs).
  • the server Data Manager is run on the Repository application processor and is responsible for ensuring the integrity and security of the data and providing external interfaces for searching, uploading and downloading data.
  • the Data Manager includes a SQL database with all of the sequence metadata, user information and system monitoring data.
  • the POC will use MySQL database, but this may be replaced with PostgreSQL or an alternate DB in other releases.
  • External interfaces are implemented as RESTful Web Service Interfaces (WSI).
  • WSI RESTful Web Service Interfaces
  • the WSI uses Apache and a Solr search index.
  • GeneTorrentTM Server Hub In one embodiment the GeneTorrentTM Server includes the Tracker and multiple Peer processes.
  • o Tracker Orchestrates the connections and tracks status for transfers between GeneTorrentTM Actors.
  • the Tracker is based on the standard well-established file distribution protocol.
  • ° Xf S gtol May be integrated within the Tracker.
  • the Repository Data Executive and the GeneTorrentTM Server Hub may be collectively referred to herein as the "GT Executive” or the “GT Exec”.
  • FIG. 21 illustrates an exemplary software architecture of a system capable of providing GeneTorrentTM file transfer capability.
  • FIG. 22 illustrates a corresponding exemplary system architecture.
  • the network operating system for the GeneTorrentTM system functions in three (3) modes: upload, download, and seeder.
  • Upload mode is used to upload Gene Torrent Object files to a Genome Data Repository.
  • Download mode that is represented in the SW suite is used to download files from the various GDRs on the network.
  • Seeder mode is a mode used within each GDR to create GeneTorrentTM server instances that seed data to download actors on the bIQ.
  • analysis.xml file name may
  • analysisFile include a path
  • —download VARIABLE is a .gto file, a URI, or an XML
  • the GeneTorrentTM system may be controlled via a command-line in the manner discussed above, in other embodiments the GeneTorrentTM system may be indirectly controlled by a third party application and/or service.
  • This form of interaction may be characterized as a form of "remote control" in that an entity external to the GeneTorrentTM system directs control of upload and download transfers.
  • the external entity may reside on the same machine(s) as the GeneTorrentTM system components or it may reside in an entirely different network, operating in a command and control fashion from afar.
  • the GeneTorrentTM system may utilize automated batching techniques.
  • the GeneTorrentTM system may be provided with a list of transfers to perform. This list of commands could be issued either all at once or sequentially by another sub-system and/or component without user interaction.
  • the GeneTorrentTM system will be capable of ingesting files of any format containing genome and transcriptome sequence data and any additional metadata files that are associated. These files are validated, encoded and encrypted in order to maximize transmission rate.
  • the GeneTorrentTM method may be applied to transfer very large files of biological sequence data along with files containing other data and information having a very specific relationship. It is this information in these files that are encrypted and configured in layers associated with a layered data model.
  • all of the data that is associated with a whole genome or whole exome sequence data could be encrypted within the same layer with one or more keys.
  • This information may include, without limitation, annotation data concerning functional regions of the genome, genes, promoters, repeat sequences, DNA methylations, SNPs, CNVs, structural variants including chromosomal rearrangements.
  • a second layer of data would include gene expression data including data from splicing, RNA processing, mR A-Seq and miR A-Seq data.
  • Another layer of encrypted data associated with the sequence files may include protein function assay results or protein level measurements.
  • Other layers of encryption may include clinical test results and information on drug metabolism and response.
  • the information that is present in the various layers might be made accessible to based on the consent of the owner and also based on the relevance of the information to the user that is making the request.
  • GDAC genome data analysis center
  • the owner of the data or an agent will receive a prompt for consent to use the data and user may then be authorized to access those regions of the genome with association to the specific disease based on layered encryption.
  • the system is designed to track and coordinate all the data contained within these ancillary files. As a result, the various nodes on the network have awareness of the location of data as well as the compute clusters and algorithms that are available. In essence, the encrypted layered data is a component part of how the network provides the content awareness and biointelligence.
  • the operating system of the network is configured in such a manner that allows authorized users to be able to access the various layers of encryption with a consent- based conditional access system. For example, if a user is authorized to access the data then the network will know where this data resides and be able to operate on it.
  • access rights to the data stored at the repository is controlled by the network operating system. This determination is made by the owner or custodian of the data by giving a one-time static consent or doing it dynamically with a different key per request. This is a novel approach to a highly distributed consent based access to personal health data which would follow and enforce the guidelines of applicable regulations and laws (e.g., HIPAA).
  • HIPAA applicable regulations and laws
  • the biointelligence of the network may reside in the many different types of information and associated data that are relating specific to genome sequence data.
  • all of the information associated with every file is searchable on a network- wide basis.
  • a user with the proper authorization would be able to submit a query relating to any type of information from Table 1 and receive a response identifying all the genome sequence data files on the network that are accessible to the user based on the consent given by the respective owners of the data within the queried files.
  • a query can be made with reference to all of the genome and transcriptome data that has been uploaded to the network during a predetermined period (e.g., within the last 60 days).
  • the response to the query would come from multiple genome data local area networks (gLANs).
  • the network OS would monitor the consent for access to data and user authorization and be able to effectively authenticate users.
  • the Nextegen Data Repository comprises high-speed fiber optic storage and computing infrastructure capable of facilitating the acquisition, secure storage, searching, and secure sharing of genome sequence data and phenotype metadata with authorized to access.
  • the repository has the following attributes:
  • the Data Repository may include the following:
  • Sequence Producing Centers are anticipated to be a primary source of sequence data. At such Centers, digital representations of biological samples are generated by processing such samples. Optionally, research centers may also upload genome data. In addition, phenotype information and high-level features derived from the raw sequence, the metadata, is produced at the DCC and other sources. Software and associated hardware will typically be located at these centers to perform the genome sequence transfer and ingestion processes. Such software will generally be capable of checking data format and validity prior to initiating uploading to the Data Repository. The software will also preferably perform transfer of genome and metadata information to Data Repository and support high capacity transfers at very high data rates (e.g., lOGigabits/second).
  • the user access software will be provided to the primary and secondary research center sites to enable downloading of information in the repository.
  • data is organized as follows:
  • cancer type lung, ovarian, etc
  • the case/sample ID will have various extensions for the various types of files made for each case:
  • Implementation of the techniques, blocks, steps and means described above may be done in various ways. For example, these techniques, blocks, steps and means may be implemented in hardware, software, or a combination thereof.
  • the processing units may be implemented within one or more application specific integrated circuits (ASICs), digital signal processors (DSPs), digital signal processing devices (DSPDs), programmable logic devices (PLDs), field programmable gate arrays (FPGAs), processors, controllers, micro-controllers, microprocessors, other electronic units designed to perform the functions described above, and/or a combination thereof.
  • ASICs application specific integrated circuits
  • DSPs digital signal processors
  • DSPDs digital signal processing devices
  • PLDs programmable logic devices
  • FPGAs field programmable gate arrays
  • processors controllers, micro-controllers, microprocessors, other electronic units designed to perform the functions described above, and/or a combination thereof.
  • the embodiments may be described as a process which is depicted as a flowchart, a flow diagram, a data flow diagram, a structure diagram, or a block diagram. Although a flowchart may describe the operations as a sequential process, many of the operations can be performed in parallel or concurrently. In addition, the order of the operations may be re-arranged. A process is terminated when its operations are completed, but could have additional steps not included in the figure. A process may correspond to a method, a function, a procedure, a subroutine, a subprogram, etc. When a process corresponds to a function, its termination corresponds to a return of the function to the calling function or the main function.
  • embodiments may be implemented by hardware, software, scripting languages, firmware, middleware, microcode, hardware description languages, and/or any combination thereof.
  • the program code or code segments to perform the necessary tasks may be stored in a machine readable medium such as a storage medium.
  • a code segment or machine-executable instruction may represent a procedure, a function, a subprogram, a program, a routine, a subroutine, a module, a software package, a script, a class, or any combination of instructions, data structures, and/or program statements.
  • a code segment may be coupled to another code segment or a hardware circuit by passing and/or receiving information, data, arguments, parameters, and/or memory contents.
  • Information, arguments, parameters, data, etc. may be passed, forwarded, or transmitted via any suitable means including memory sharing, message passing, token passing, network transmission, etc.
  • the methodologies may be implemented with modules (e.g., procedures, functions, and so on) that perform the functions described herein. Any machine-readable medium tangibly embodying instructions may be used in implementing the methodologies described herein.
  • software codes may be stored in a memory.
  • Memory may be implemented within the processor or external to the processor.
  • the term "memory" refers to any type of long term, short term, volatile, nonvolatile, or other storage medium and is not to be limited to any particular type of memory or number of memories, or type of media upon which memory is stored.
  • the term “storage medium” may represent one or more memories for storing data, including read only memory (ROM), random access memory (RAM), magnetic RAM, core memory, magnetic disk storage mediums, optical storage mediums, flash memory devices and/or other machine readable mediums for storing information.
  • ROM read only memory
  • RAM random access memory
  • magnetic RAM magnetic RAM
  • core memory magnetic disk storage mediums
  • optical storage mediums flash memory devices and/or other machine readable mediums for storing information.
  • machine-readable medium includes, but is not limited to portable or fixed storage devices, optical storage devices, wireless channels, and/or various other storage mediums capable of storing that contain or carry instruction(s) and/or data.

Landscapes

  • Health & Medical Sciences (AREA)
  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Theoretical Computer Science (AREA)
  • Bioethics (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Databases & Information Systems (AREA)
  • Biophysics (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Biotechnology (AREA)
  • Evolutionary Biology (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Spectroscopy & Molecular Physics (AREA)
  • Genetics & Genomics (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

A method of processing, transmitting, and otherwise facilitating network-based transactions involving, polymeric sequence information is disclosed herein. Systems and methods for facilitating uploading, downloading and other network-based transactions involving sequence information, such as large files of genomic sequence data are described. These transactions may involve communicating such large files of sequence information between entities such as, for example, genome sequence centers (GSCs), genome data repositories (GDRs), genome data analysis companies (GDACs) and or data coordination centers (DCCs).

Description

SYSTEM AND METHOD FOR FACILITATING NETWORK-BASED TRANSACTIONS INVOLVING SEQUENCE DATA
FIELD
[1001] This application is generally directed to processing polymeric sequence information, including biopolymeric sequence information such as DNA sequence information, and to transmission of such sequence information between locations within a network.
BACKGROUND
[1002] Deoxyribonucleic acid ("DNA") sequencing is the process of determining the ordering of nucleotide bases (adenine (A), guanine (G), cytosine (C) and thymine (T)) in molecular DNA. Knowledge of DNA sequences is invaluable in basic biological research as well as in numerous applied fields such as, but not limited to, medicine, health, agriculture, livestock, population genetics, social networking, biotechnology, forensic science, security, and other areas of biology and life sciences.
[1003] Sequencing has been done since the 1970s, when academic researchers began using laborious methods based on two-dimensional chromatography. Due to the initial difficulties in sequencing in the early 1970s, the cost and speed could be measured in scientist years per nucleotide base as researchers set out to sequence the first restriction endonuclease site containing just a handful of bases.
[1004] Thirty years later, the entire 3.2 billion bases of the human genome have been sequenced, with a first complete draft of the human genome done at a cost of about three billion dollars. Since then sequencing costs have rapidly decreased. Today, many expect the cost of sequencing the human genome to be in the hundreds of dollars or less in the near future, with the results available in minutes, much like a routine blood test.
[1005] As the cost of sequencing the human genome continues to decrease, the number of individuals having their DNA sequenced for medical, as well as other purposes, will likely significantly increase. Currently, the nucleotide base sequence data collected from DNA sequencing operations are stored in multiple different formats in a number of different databases. Such databases also contain scientific information related to the DNA sequence data including, for example, information concerning single nucleotide polymorphisms (SNPs), gene expression, copy number variations. Moreover, transcriptomic and proteomic data are also present in multiple formats in multiple databases. This renders it impractical to exchange and process the sources of DNA sequence data and related information collected in various locations, thereby hampering the potential for scientific discoveries and advancements.
SUMMARY
[1006] This disclosure is generally directed to a method of processing, transmitting, and otherwise facilitating network-based transactions involving, polymeric sequence information. More particularly but not exclusively, in one aspect the disclosure describes systems and methods for facilitating uploading, downloading and other network-based transactions involving sequence information, such as large files of genomic sequence data. These transactions may involve communicating such large files of sequence information between entities such as, for example, genome sequence centers (GSCs), genome data repositories (GDRs), genome data analysis companies (GDACs) and or data coordination centers (DCCs). Each of these entities may be either public institutions privately owned or privately-owned enterprises.
[1007] The sequencing data involved in such transactions may be generated by, for example, a GSC, which receives a purified prep of a patient's chromosomal and or mitochondria DNA, or an RNA prep, for sequencing. The patient's identification will typically be anonymized with a series of codes to label the specific aliquot from a sample preparation and the organ, tissue or cell types. Furthermore, other information including but not limited to EMR data, clinical and pharmacological as well other network metadata that is specific to the particular patient can be collected by the DCCs but kept separate from the genomic data.
[1008] The sequence data that is generated by the GSCs may be provided to or otherwise transferred within a biological data network, which may also be referred to herein as a Biolntelligent or "bIQ" network. An exemplary bIQ network is described within, for example, U.S. Patent Application Publication No. 2012/0233201. Metadata relating to the sequence data may be collected and utilized during the processing of the sequence data throughout the bIQ network in order to, for example, facilitate data coordination, correlation, privacy, security, validation and authentication. These and other aspects of the disclosed system and method are described hereinafter. [1009] In one particular aspect the disclosure is directed to a genome storage repository including a data repository. The genome storage repository includes a receive interface for receiving, from over a network, a plurality of portions of at least one file of biological sequence data conveyed over the network in accordance with a parallel file transfer process. The genome storage repository further includes a controller in communication with the receive interface and the data repository. The controller generates a reconstructed file of biological sequence data by reconstructing the at least one file of biological sequence data using the plurality of portions of the at least one file of biological sequence data.
[1010] In another aspect the disclosure is directed to a subscriber node operable within a biological data network. The subscriber node includes a receive interface for receiving, over one or more data links of the biological data network, a plurality of biological data units containing encoded genomic information wherein the encoded genomic information represents genomic information encoded relative to a reference sequence. The subscriber node further includes a controller for processing the plurality of biological data units.
[1011] The disclosure is also directed to a genome storage repository including a data repository containing encoded genomic information and biological information relating to the encoded genomic information. The genome storage repository also includes a controller for generating a plurality of data units containing the encoded genomic information and the biological information. A transmit interface operates to transfer the plurality of data units to a subscriber device over a network.
[1012] In yet another aspect the disclosure pertains to a node operable within a biological data network. The node includes a receive interface for receiving a plurality of data units from one or more data links of the biological data network wherein each of the plurality of data units includes a payload representative of encoded genomic information and a header representative of biological information relating to the encoded genomic information. The node further includes a data repository and a controller for storing the plurality of data units within the data repository.
[1013] In a further aspect the disclosure relates to a subscriber node having a receive interface for receiving, from over a network, an encrypted data unit containing encoded genomic information wherein the encoded genomic information represents genomic information encoded relative to a reference sequence using a plurality of instructions. The subscriber node further includes a controller for decrypting the encrypted data unit using a subscriber key. [1014] The disclosure further pertains to a method which includes receiving, from over a network, a plurality of portions of at least one file of biological sequence data conveyed over the network in accordance with a parallel file transfer process wherein ones of the plurality of portions are transferred substantially simultaneously in multiple data streams. The method also includes generating a reconstructed file of biological sequence data by reconstructing the at least one file of biological sequence data using the plurality of portions of the at least one file of biological sequence data. The at least one file of biological sequence data is then stored within a data repository.
[1015] In another aspect the disclosure relates to a method which includes receiving, over one or more data links of a biological data network, a plurality of biological data units containing encoded genomic information wherein the encoded genomic information represents genomic information encoded relative to a reference sequence. The method further includes processing the plurality of biological data units and storing the plurality of biological data units within a memory unit.
[1016] In yet a further aspect the disclosure pertains to a method which includes establishing a data repository containing encoded genomic information and biological information relating to the encoded genomic information. The method further includes generating a plurality of data units containing the encoded genomic information and the biological information. The plurality of data units are then transferred to a subscriber device over a network.
[1017] The disclosure is also directed to a method which includes receiving a plurality of data units from one or more data links of a biological data network wherein each of the plurality of data units includes a payload representative of encoded genomic information and a header representative of biological information relating to the encoded genomic information. The method also includes storing the plurality of data units within a data repository.
[1018] In a further aspect the disclosure pertains to a method which includes receiving, from over a network, an encrypted data unit containing encoded genomic information wherein the encoded genomic information represents genomic information encoded relative to a reference sequence using a plurality of instructions. The method also includes decrypting the encrypted data unit using a subscriber key so as to generate a decrypted data unit and storing the decrypted data unit within a memory.
[1019] In another aspect the disclosure relates to a genome storage repository including a data repository containing encoded genomic information and biological information relating to the encoded genomic information. The genome storage repository includes a receive interface for receiving, from over a network, a processing request from an analysis node. The genome storage repository further includes a controller operative to process, in response to the processing request, at least the genomic information in accordance with an analysis program in order to generate analysis results. The genome storage repository may further include a transmit interface configured to transmit the analysis results over the network to the analysis node. In addition, the receive interface may be further configured to receive the analysis program from the analysis node.
[1020] In yet a further aspect the disclosure relates to a method which includes establishing a data repository containing encoded genomic information and biological information relating to the encoded genomic information. The method also includes receiving, from over a network, a processing request from an analysis node. In addition, the method includes processing, in response to the processing request, at least the genomic information in accordance with an analysis program in order to generate analysis results. The method may also contemplate transmitting the analysis results over the network to the analysis node and receiving the analysis program from the analysis node.
BRIEF DESCRIPTION OF THE DRAWINGS
[1021] The present application may be more fully appreciated in connection with the following detailed description taken in conjunction with the accompanying drawings, wherein:
[1022] FIG. 1 illustratively represents a genome sequence data network incorporating a high capacity, high throughput networked-based genome storage repository (GSR).
[1023] FIG. 2 illustrates a first exemplary implementation of a genome sequencing center (GSC) configured to operate in a biological data network.
[1024] FIG. 3 depicts a second exemplary implementation of a GSC configured to operate in a biological data network.
[1025] FIG. 4 illustrates an exemplary implementation of a network-based genome storage repository.
[1026] FIG. 5 depicts a codec schema representative of various encoding, decoding, encryption, decryption and transcoding operations which may be effected within a biological data network. [1027] FIG. 6 shows one manner in which a distributed conditional access system (DCAS) may be employed for the management of access to the data within a biological data network.
[1028] FIG. 7 illustratively represents the incorporation of a distributed conditional access system (DCAS) within an alternative data network.
[1029] FIG. 8 illustrates one manner in which the encode/decode and encrypt/decrypt schema described with reference to FIGS. 1-7 may be utilized to mediate genomic-based transactions among various users of a biological data network.
[1030] FIG. 9 is a flowchart of an encoding and encryption process which may be employed within a biological data network.
[1031] FIG. 10 illustrates a comparative sequence analysis process used to minimize apparent biological differences between a reference and a sample sequence entry.
[1032] FIG. 11 is a flowchart of an alternate encoding and encryption process capable of being employed within a biological data network.
[1033] FIG. 12 provides a high-level view of the architecture of a GeneTorrent™ system configured to to enable a cluster of servers to tranfer parallel streams of file information to a user system.
[1034] FIGS. 13-18 illustrate exemplary operation of one embodiment of a Transactor.
[1035] FIGS. 19A-19B illustrate an exemplary GeneTorrent™ upload operation.
[1036] FIGS. 20A-20B provide an illustration of a secure GeneTorrent™ download workflow between client-side GeneTorrent™ data consumers and various server-side components.
[1037] FIG. 21 illustrates an exemplary software architecture of a system capable of providing GeneTorrent™ file transfer capability.
[1038] FIG. 22 illustrates an exemplary system architecture capable of supporting the software architecture of FIG. 21.
DETAILED DESCRIPTION
SYSTEM OVERVIEW AND WORKFLOW
[1039] Attention is now directed to FIG. 1, which illustratively represents a genome sequence data network 100 incorporating a high capacity, high throughput networked-based genome storage repository (GSR) 110. The network may also be referred to herein as a bIQ network. The GSR 110, which contains genomic sequence data and related information, is in network communication with one or more genome sequencing centers (GSCs) 114, one or more genome data analysis centers (GDACs) 116, and one or more subscriber systems 120. In an exemplary embodiment such network communication is designed to take place over one or more existing wide area networks, such as the Internet. The GSR 110 may function as a central repository for the GSCs 114 to store, and GDACs 116 to retrieve, sequence data and associated metadata.
[1040] As is discussed below, a typical workflow scenario involving the network 100 may begin with submission of a tissue sample to a GSC 114 or associated institution for preparation of genome analyte. The workflow continues with DNA/RNA sequencing and characterization by a GSC 114 and upload of the resultant sequence data and related information to the GSR 110. In one embodiment the sequence data produced by the GSC 114 is produced in a BAM format or other conventional format and is transferred to the GSR 110 using the GeneTorrent™ techniques described in the above -referenced provisional patent application nos. 61/539,942 and 61/662,996. At the GSR 110, the received BAM files may be encoded into the bIQ format described hereinafter and in the above -referenced patent applications. The bIQ- formatted data may then be downloaded to subscriber systems 120 using GeneTorrent™ techniques or otherwise made available for further processing by one or more genome data analysis centers (GDACS) 116.
[1041] In one embodiment the GSR 110 also synchronizes with a data coordination center (DCC) 124 or equivalent system configured to provide the primary coordination portal for researchers or other personnel involved with a particular research initiative, project or commercial endeavor. In general, the applicable DCC 124 maintains the higher-level study attributes and clinical data associated with each tissue sample. The GSR 110 will query the applicable DCC 124 to verify that submitted data is associated with a valid sample. The DCC 412 can also retrieve catalog information from an external source and allow users to perform queries across project, sample and sequence data.
[1042] Considering now the workflow of FIG. 1 in greater detail, a bio-specimen (e.g., a tissue sample) is furnished to one of the GSCs 114 (or to an associated institution such as a Biospecimen Core Resource) and used as the basis for preparation of a genome analyte. Aliquots of the analyte (e.g., DNA or RNA) are then provided to, or developed within, a GSC 114 for sequencing and characterization. The GSC 114 uploads the resultant sequence data and associated metadata to the GSR 110 and may transfer other metadata, e.g., Sample and Data Relationship Format (SDRF) metadata, to a project data portal provided by the DCC 124. Once stored within the GSR 110, the sequence data and associated data may be queried and downloaded by authorized personnel (e.g., researchers) associated with the GDACs 116.
[1043] During operation of the network 100, the GSR 110 will generally synchronize information, and otherwise coordinate closely, with the one or more DCCs 124 respectively providing coordination portals for various projects or groups of researchers. In an exemplary embodiment each of the DCCs 124 maintains the higher-level study attributes associated with at least one such project as well as clinical data associated with each sample. The GSR 110 will query the appropriate DCC 124 to verify that data submitted by a GSC 114 is associated with a valid sample. In certain embodiments some or all of the DCCs 124 may retrieve catalog information in order to enable users at the GDACs 116 to perform queries across project, sample and sequence data. In other embodiments queries from GDACs 116 will be received through a portal or other interface established by the GSR 110. In one embodiment the repository 110 consults an external user authentication database (not shown) in connection with authorization of users for uploading, downloading, and/or querying of sequence information. As is discussed below, users may be authorized for different roles with respect to different projects coordinated by the DCCs 124.
[1044] In one embodiment a unique ID ("UUID") is assigned to each aliquot of the tissue samples provided to or processed by a particular GSC 114. The UUID may, for example, be included within anonymized metadata associated with each physical aliquot sample and electronically transmitted by the GSC 114 to the DCC 124. Such metadata may include, for example, information identifying the tissue source site, sample type, analyte type, patient ID, and other information characterizing the sample or the facilities/equipment used to obtain the sample. The DCC 124 then creates a new sample record based upon this metadata, which is associated with the UUID corresponding to the aliquot. This metadata can then be retrieved from the DCC 124 through, for example, a web interface which may or may not be provided by a data portal of the DCC 124.
[1045] The GSC 114 to which the sample is provided will perform sequencing and thereby generate BAM file(s), or other files of predefined type, containing the resultant sequence information. The GSC 114 then defines an analysis object ("Analysis object"), which in one embodiment includes a metadata file and the BAM files(s) corresponding to the metadata. The GSC 114 also assigns a UUID to the Analysis object. An upload client (described below) at the GSC 114 then initiates the sequence submission process by passing a user certification/session token and the submission metadata to the GSR 110 for validation. If validation is successful, the GSR 110 will create a database entry for the Analysis object and each of its constituent BAM files. As is discussed below, the GSR 110 will then track the status of the submission as it moves from loading, through any validation or transfer errors, until it is ready for download by a subscriber system 120.
[1046] In one embodiment each metadata file may include references to the UUIDs corresponding to all of the sequence data files (e.g., BAM files or other sequence data files of predefined type) and aliquots linked to the bio-specimen data (i.e., data related to the initial tissue sample) maintained within the DCC 124. Alternatively, this information may be included within a separate file which is independently provided by the GSC 114 to the GSR 110 as part of the sequence submission process. The GSR 110 may then verify that these UUIDs correspond to valid UUIDs stored within the DCC 124 before creating a corresponding submission record and UUID corresponding to each Analysis object (and potentially each individual BAM file of the Analysis object) to be uploaded. In addition, the sequence data associated with a given submission may be suppressed, and new sequence data can be submitted for the same sample. This may occur with respect to cases in which, for example, it is desired to "top off a previous submission with more complete coverage.
[1047] In one embodiment the GSR 110 maintains a list of "valid" bio-specimens (e.g., tissue samples) for a particular project and regularly synchronizes this list to corresponding information maintained at the corresponding DCC 124. This enables the sequence information corresponding to a particular sample to be redacted at the GSR 110 in response to information received from the DCC 124. For example, if the owner of a particular tissue sample at some point revokes consent relating to the download of sequence information derived from the sample, such sequence information could be redacted at the GSR 110. In certain cases the metadata information associated with such redacted sequence information could be searched in response to queries submitted by subscriber systems 120 and/or GDACs 116, but the associated, redacted sequence information would not be available for download. In other embodiments only users of a subscriber system 120 having a certain authorization or subscription level would be permitted to download sequence information corresponding to metadata identified in response to a query received from such a system 120; that is, such sequence information would be appear to be redacted or otherwise suppressed or unavailable when identified in metadata returned in response to queries received from unauthorized users.
[1048] As is discussed below, in one embodiment the GSC 114 may utilize a highspeed, parallelized file transfer process to transfer the BAM file(s) associated with the Analysis object to the GSR 110. In one embodiment the BAM file(s) are encrypted using a key specific to the particular session in which the file(s) are transferred. The associated metadata, which will generally be included within an encrypted file of inconsequential size relative to the size of the Analysis object, may then be separately sent to the GSR 110 using a conventional file transfer process. At the GSR 110, the encrypted BAM files(s) are decrypted and the sequence data included therein is encoded into the biQ format for storage, typically together with all or part of the metadata. In response to a download request or query from a subscriber system 120, a substantially similar or identical high-speed, parallelized file transfer process may then be used to communicate the encoded sequence data and related metadata of interest the requesting system 120. In one embodiment the encoded sequence data and related metadata is encrypted using both a key specific to the particular session in which the transfer occurs and a key unique to the requesting subscriber system 120.
EXEMPLARY SYSTEM AND COMPONENT ARCHITECTURE
[1049] Attention is now directed to FIG. 2, which illustrates a first exemplary implementation of a GSC 114. One or more high-speed sequencing machines 202 are operative to generate sequence reads, which are then aligned and mapped to a reference sequence in alignment / mapping module 206. Variants may also be called. In one embodiment the module 206 produces BAM files comprised of sequence alignment data; that is, binary versions of sequence alignment/mapping (SAM) files.
[1050] The BAM files produced by the module 206 are provided to an input interface 210 of a processing module 220. A processor 224 operates to store the received BAM files along with related metadata within a file storage unit 228 and executes an encryption module 240 to encrypt this information using a key associated with, for example, a particular data transfer session. As is discussed in further detail below, the processor 224 executes the instructions of a GeneTorrent™ upload client 230 to transfer the BAM files within the file storage unit 228 to the GSR 110 via a network interface 236. In one embodiment the metadata stored within the file storage unit 228, which will typically be only a small fraction of the size of the associated BAM files, is transferred to the GSR 110 using conventional network transmission techniques.
[1051] FIG. 3 depicts a second exemplary implementation of a GSC 114. As shown, one or more high-speed sequencing machines 302 are operative to generate sequence reads, which are then provided to an input interface 310 of a processing module 320. A processor 324 operates to store the received sequence data reads along with related metadata within a storage unit 326. In the implementation of FIG. 3, the processor 324 executes the instructions of an encoding module 336 in order to encode each sequence read (i.e., segment of biological sequence data) stored within the storage unit 326 into a formatted biological data unit comprised of a header and a payload (such format also being referred to herein as the bIQ format). As is described in above-referenced co-pending patent applications, the payload of each biological data unit may be representative of or contain an encoded representation of a segment of biological sequence data. In one embodiment this encoded representation comprises a set of instructions which are at least implicitly defined relative to a reference sequence 338. The header of each biological data unit may include biological or other information relating to the encoded information included within or represented by its payload. In one embodiment this header information includes information stored within one or more layered data tables 340. For example, the header information may include DNA- related information included within one or more DNA layer tables 342, R A-related information included within one or more RNA layer tables 344, protein-related information included within one or more protein layer tables 346, or information from other layer tables 350.
[1052] In the embodiment of FIG. 3, the processor 324 stores the biological data units comprising encoded sequence information and related metadata within a file storage unit 328 and may execute an encryption module 332 to encrypt the biological data units using a key associated with, for example, a particular data transfer session. In alternative embodiments, the processor 324 may operate upon the sequence reads received from the input interface 310 to create biological data units substantially simultaneously with storing such reads within the storage unit 326. The processor 324 further executes the instructions of a GeneTorrent™ upload client 330 to transfer the biological data units within the file storage unit 328 to the GSR 110 via a network interface 360 in the manner described below.
[1053] Thus, the disclosure contemplates that a GSC 114 may be configured to transfer, using a GeneTorrent™ upload client, either BAM files or encoded sequence information (i.e., biological data units) to the GDR 110 to enable distribution of the subject genomic information to subscriber systems. It should be appreciated that in embodiments in which the subject genomic information is encoded into biological data units at a GSC 114, an encoding process similar or identical to that described with reference to FIG. 3 may occur at the GDR 110. This approach is described below with reference to FIG. 5.
[1054] Attention is now directed to FIG. 4, which depicts an exemplary implementation of the GSR 1 10. In the embodiment of FIG. 4, the GSR 110 is configured to receive BAM files and related metadata from the GSCs 114. That is, in the embodiment of FIG. 4 it is assumed that the sequence reads from the sequencing machines within the GSCs 114 are not being encoded into biological data units prior to be transmitted to the GSR 110. In embodiments in which such biological data units are generated at the GSC 114, it would be unnecessary to include a similar sequence encoding capability within the GSR 110.
[1055] The GSR 110 includes an input interface 410 configured to receive the BAM files and related metadata transferred from a GSC 114. In order to facilitate this transfer a processor 424 of the GSR 110 executes the instructions of a GeneTorrent™ application 430 disposed to interact with the GeneTorrent™ upload client executed at the GSC 114. In one embodiment GSR 110 includes a storage processor 425 operative to store the received BAM files along with the related metadata within a storage unit 426. In the implementation of FIG. 4, the processor 424 executes the instructions of an encoding module 436 in order to encode each sequence read (i.e., segment of biological sequence data) stored within the storage unit 426 into a formatted biological data unit comprised of a header and a payload. The payload of each biological data unit may be representative of or contain an encoded representation of a segment of biological sequence data. In one embodiment this encoded representation comprises a set of instructions which are at least implicitly defined relative to a reference sequence 438. The header of each biological data unit may include biological or other information relating to the encoded information included within or represented by its payload. In one embodiment this header information includes information stored within one or more layered data tables 440. For example, the header information may include DNA- related information included within one or more DNA layer tables 442, RNA-related information included within one or more RNA layer tables 444, protein-related information included within one or more protein layer tables 446, or information from other layer tables 450.
[1056] The storage processor 425 stores the biological data units comprising encoded sequence information and related metadata within a file storage unit 428 and may execute an encryption module 432 to encrypt the biological data units using one or more encryption keys. For example, in one embodiment execution of the encryption module 432 effects encryption using both a key associated with a particular data transfer session and a key associated with the subscriber system to which the encrypted biological data units are being transferred. As is discussed further below, the processor 324 further executes the instructions of the GeneTorrent™ application 330 to transfer the encrypted biological data units within the file storage unit 428 to a GeneTorrent™ download client within the requesting subscriber system via a network interface 460. EXEMPLARY ENCODING, ENCRYPTION AND TRANSCODING APPROACHES
[1057] Attention is now directed to FIG. 5, which depicts a codec schema 500 representative of the various encoding, decoding, encryption, decryption and transcoding operations which may be effected within the data network 100. As shown, the schema 500 includes an encoder 510 for performing an encode element 512 and an encrypt element 514 with respect to a file of sequence data 516. The file of sequence data 516 may be of, for example, a mapped format or a variants call format (VCF). In one embodiment the encoder 510 is representative of the encoding and encryption operations which may occur within a GSC 114 in a manner consistent with the present disclosure.
[1058] The encoder 510 may align and map sequence reads to a reference sequence and call variants. During this first stage the format of the data can be expected to be in many different formats and operated upon by several different versions of algorithms and analytical tools. In one embodiment the sequence data that is generated and processed by the encoder 510 is not yet accessible to other components of the data network 100 or to other biological networks in communication therewith.
[1059] In one embodiment the encode element 512 generates biological data units based upon the segments of sequence data 516 included within each file 516. As discussed above, each biological data unit may include a header containing information relevant to the sequence information encoded within the payload of the biological data unit. The headers of each biological data unit may comprise layers of annotation and other information and may effectively function as tags for the sequence information included within the files 516. Metadata may also be directly embedded with the sequence data included within the payloads of biological data units to enhance and facilitate data processing operations elsewhere within the network 100.
[1060] The schema 500 further includes a network-based distributor 520 configured to receive encrypted and encoded files or segments of sequence data for distribution to requesting subscribers. The distributor 520 may, for example, be representative of the functionality implemented within an exemplary implementation of the GSR 110. As shown, the distributor 500 includes a receive element 522 for receiving the encrypted and encoded sequence data transmitted by the encoder 510 over a network. A decrypt element 524 decrypts the encrypted and encoded sequence data and provides the unencrypted result to a storage element 526 for storage within the distributor 500. In response to a request or query from a decoder 540 (described below), a retrieve element 528 cooperates with the storage element 526 to retrieve the encoded sequence information corresponding to the request or query. An encrypt element 530 then encrypts the retrieved, encoded sequence information prior to transmission over a network to the requesting decoder 540. In one embodiment this encryption is performed using a first encryption key associated with the data transfer session in which the encoded sequence information is transmitted and a second encryption key specific to the requesting decoder 540.
[1061] As shown in FIG. 5, each decoder 540 includes a decode element 542 and a decrypt element 544 for decrypting and decoding, respectively, the encoded and encrypted sequence information received from the distributor 520. As a result of these operations each decoder 540 produces a file 560 of sequence data corresponding to a reconstructed version of one of the files of sequence data 516 provided to the encoder 510. Each decoder 540 may, for example, be representative of the functionality implemented within an exemplary implementation of a subscriber system 120.
[1062] Also included within the schema 500 is a transcoder 570 having a transcode element 572. The transcoder 570 is operative to add data to, or associate additional data with, the encoded sequence information managed by the storage element 526 of the distributor 520. In one embodiment such additional data may be created as a consequence of processing the encoded sequence data within the distributor 520 using analysis programs or tools provided to the distributor by the transcoder 570. In other embodiments such data may comprise new knowledge from analysis of the encoded sequence data conducted at the transcoder or new information added from network metadata analysis. In addition to or in lieu of being retained by the storage element 526 of the distributor 520, the results of the processing initiated by the transcoder 570 may be returned to the trasnscoder 570 for storage. The transcoder 570 may, for example, be representative of the functionality implemented within an exemplary implementation of a GDAC 116.
[1063] As shown in FIG. 5, the schema 500 further includes a data manager 580 configured with an entitlement element 582 and a catalog 584. The entitlement element 582 receives authorization information 586 and is responsible for enforcing conditional access control throughout the network 100. That is, the entitlement element 582 regulates access to the information within the files 516 distributed throughout the network 100.
[1064] In one embodiment the conditional access control effected by the entitlement element 582 is distributed among the elements of the network 100. This distributed approach may be desirable in view of the nature of the sequence data and metadata being conditionally accessed during the execution of transactions involving such information. For example, such data may include sensitive or other preferably private information concerning individuals associated with sequence information potentially available throughout the network 100 and throughout systems linked to the network 100. In such case a distributed approach to regulating access to such sensitive information may be advantageous since data access may be controlled at multiple points within the network 100.
[1065] Attention is now directed to FIG .6, which illustratively represents the incorporation of a distributed conditional access system (DC AS) within the network 100. In an exemplary embodiment users on the network 100 are authenticated using a system of highly distributed conditional access points. This may involve, for example, using an encoder to perform high speed pattern matching in a manner that is consistent with the standardized compression and encryption format. The encoder is able to efficiently couple these two processes together for best compression with highest security.
[1066] Regardless of the sequencing platform that is used by a GSC 114, the data may be formatted in such a way that it can be used in a standard compression and encryption format that is consistent with all GSCs approved for medical and pharmaceutical grade sequencing.
[1067] As shown in FIG. 6, a distributed conditional access system (DCAS) may be employed for the management of access to the data within the network 100. Such access may be based on, for example, a combination of qualifications including, without limitation, a consent requirement, medical or health alerts, analytical reports, updating the data with current findings and social reports. To the extent the sequence data is encoded in a common format when communicated on the network 100, conditional access of the sequence data may be effected at each and every transaction point. Development of such a common format could, for example, be based upon input provided by various agencies, individuals and institutions.
[1068] The rationale for a common format for encode and encryption of biological sequence data is based on the desire for an electronic mechanism that facilitates authorized transactions of information exchange involving human genomic and transcriptomic data as related to deep evaluation and analysis of these data types.
[1069] In one embodiment digital rights management will be mediated by the DCAS. The general specifications of rights management could be developed to be consistent with, for example, regulatory guidelines set by a genotype and phenotype expert group or other organization. For example, such guidelines may specify those authorized to access the stream of germline variants versus those authorized to access somatic variants files. One aspect of such guidelines could address an individual's rights with regard to genome sequence data, while another aspect could focus upon gene differential expression from R A-Seq data.
[1070] The common format will preferably be optimized to encode and encrypt this data and will provide guidelines to regulate transmission and storage of this highly sensitive data. For example, in one embodiment the encryption scheme should involve granularity to the extent where access to any component of the data can be filtered and regulated to the ΝΛ degree in order to enable various levels of user accessibility.
[1071] In one aspect, the disclosed system provides for the highest level of privacy by utilizing an approach to access control that is highly-distributive and easily regulated at nearly every transaction point. For example, conditional access control functionality should be present at the GSC 114 where sequence data is produced. The particular GSC 114 generates genome sequences for many different research groups, consortiums, research projects, clinics, pharma and individuals and all of this data will be sent to different places. The various data consumers will have different levels of access to the dataset. A typical scenario might involve a case where one GDAC 116 is entitled to view all sequence variants, somatic and germline combined while another might be entitled to access somatic mutations only.
[1072] In one embodiment an encrypted content key, Keyc may be generated for one set of genome sequence data files and separate subscriber keys, Keys, generated for subscribers having different levels of entitlement to access the data.
[1073] For example, the data might be sent directly from a GSC 114 and post processed to a GSR 110. The source of this data will require access from multiple subscribers and different types of results will be published to several orders more destinations. The GSR 110 may be equipped with DC AS as a main transaction point for regulation of queries, subscriptions, publishing and function request.
[1074] In one embodiment the genome data transaction system provides a sequence data validation service which uses network-wide data coordination protocols.
[1075] FIG. 7 illustratively represents the incorporation of a distributed conditional access system (DC AS) within an alternative data network 700. The network 700 is similar to the network 100, but includes multiple network-based genome storage repositories 110 linked to a data coordination center (DCC) 710. In addition, subscriber systems are disposed to query and interface with a GDAC 116 rather than with a GSR 110. It should be appreciated that other variations of the architecture of the network 100 are within the scope of the disclosure. [1076] Turning now to FIG. 8, an illustration is provided of one manner in which the encode/decode and encrypt/decrypt schema described with reference to FIGS. 1-7 may be utilized to mediate genomic-based transactions among various users of the network 100. As was described with reference to FIGS. 1-7, data that is presented to a GSC 114 in a BAM format or any other format capable of being encoded into the bIQ format may be efficiently transmitted to a remote location within the network 100. One advantage of the biQ format is that the data can be operated upon in the compressed format, which obviates the need for conversion between a format suitable for compression and one optimized for processing and/or data security.
[1077] In one embodiment the GSC 114 receives various aliquots of highly purified analytes containing preparations of genomic and mitochondrial DNA and R A. Using the several different sequencing platforms DNA-Seq and R A-Seq data is generated. The GSC 114 will generally store the raw sequence reads in the format of the platform or machine generating the reads (e.g., within BAM files). The GSC 114 will also typically store the metadata for such platform or machine, information relating to the operator, the date of the sequence run, and other related information. This metadata information can be incorporated into biological data containing the compressed and encoded sequence data, which are then generally encrypted prior to being transmitted from the GSC 114 to the GSR 110 or, in other embodiments, to a GDAC.
[1078] The encoder device utilized in the GSC 114 may be comprised of hardware and software configured in a manner that is capable of processing BAM files at the rate of the stream. The encoder preferably matches dictionary word patterns and uses a compression and encryption scheme that enables secure transmission and entitlement management of the transactions that involves this data. In this regard the codec model of FIG. 5 provides a mechanism for commercial transactions involving transmission, exchange and analysis of genome sequence data.
[1079] For example, a doctor that is treating a cancer patient that is a difficult case can simply order a genome data analysis report (GDA Report) using a process that is similar to ordering a blood chemistry report today. In this case, based on symptoms and an assessment from a genetic counselor, the doctor may order a whole-genome sequence data analysis. The entire process can be medicated by the system described herein, with contractual relations involving the various entities being indicated in the outer layer of FIG. 6.
[1080] The workflow of FIG. 6 may be summarized as follows: • An oncologist experiences difficulty treating a cancer patient
• Tumor image and other clues suggest genomics
• Patient is sent to a genetic counselor
• Results suggest whole genome data analysis report (GDA Report)
• Doctor orders whole genome sequence (WGS)
• Tissue sample is taken at a biospecimen core resource (BCR) facility
• Purified genomic DNA is sent to genome sequencing center (GSC)
• The raw reads data that is produced at the GSC is aligned, mapped and variants calls are made
• The preprocessed is compared against other preprocessing data and metadata to insure the highest quality processing
• Processed WGS are passed through a series of genome data analysis centers (GDACs) for various analysis and correlation studies
• The results are aggregated and review by specialized medical expert and a short meaning genomic data analysis report (GDA Report) is prepared and present to primary doctor
• Once the GDA Report has been prepared, it may be integrated into the patient's EMR
• The analysis that is carried out at the GDAC may involve access to the patient's EMR or relevant information from EMR
• GDACs may also have access to certain relevant drug interaction databases to generate highest quality GDA reports
• Oncologist or other doctor can now make personal genome-based medical decisions
[1081] The present approach enables a high level of data protection and coordination from the time of a doctor's decision that a patient's genome data and other molecular markers may be relevant to the treatment of the patient. This scheme provides a first-in-kind mechanism to offer a genomic data electronic transaction model with state of the art entitlement management system.
[1082] At this stage, the information that is contained in a full genome data analysis report along with information from the EMR and the various metadata can be used to populate a semantic database and linked with other data such as but not limited to research publications, off-label drug data from pharmaceutical companies, drugs in the development pipeline, upcoming drug trials, communications between experts and other such related information of any type that might be relevant to the case. [1083] The organization of the various types of data will allow meaningful usefulness of the vast amount of data that can be integrated into a medical decision making process.
[1084] Attention is now directed to FIG. 9, a flowchart is provided of an encoding and encryption process 900 which may be employed within the network 100. As shown, sequence data 904 is encoded/compressed into the payloads 910 of biological data units (stage 908). Biological and other information 912 specific to the sequence information is used as the basis of headers 914 inserted such biological data units (stage 916). In one embodiment each header 914 includes information relating to a different layer of a biological data model associated with the sequence information. For example, the type of information that could be embedded and interwoven with the sequence data in the form of headers 914 (or as annotations within the payload of each biological data unit) could include, for example and without limitation, information concerning genotype, gene expression levels, methylation, micro RNA interactions, drug response, clinical, environmental and any such relate annotation specific to the sequence files. See, for example, U.S. Patent Application Serial No. 13/223,071, entitled "METHOD AND SYSTEMS FOR PROCESSING POLYMERIC SEQUENCE DATA AND RELATED INFORMATION"; U.S. Patent Application Serial No. 13/223,077, entitled "METHOD AND SYSTEMS FOR PROCESSING POLYMERIC SEQUENCE DATA AND RELATED INFORMATION"; U.S. Patent Application Serial No. 13/223,084, entitled "METHOD AND SYSTEMS FOR PROCESSING POLYMERIC SEQUENCE DATA AND RELATED INFORMATION"; U.S. Patent Application Serial No. 13/223,088, entitled "METHOD AND SYSTEMS FOR PROCESSING POLYMERIC SEQUENCE DATA AND RELATED INFORMATION"; U.S. Patent Application Serial No. 13/223,092, entitled "METHOD AND SYSTEMS FOR PROCESSING POLYMERIC SEQUENCE DATA AND RELATED INFORMATION"; and U.S. Patent Application Serial No. 13/223,097, entitled "METHOD AND SYSTEMS FOR PROCESSING POLYMERIC SEQUENCE DATA AND RELATED INFORMATION", each of which was filed on August 31, 2011 and is incorporated by reference herein for all purposes.
[1085] In one embodiment much of the information that is layered on top of the raw sequence data will comprise annotations and other biologically intelligent information that is known today. As the bIQ network is developed and utilized it is anticipated that analytics builders and others at GDACs and other institutions will likely be substantial suppliers of new information that can be added to existing layers of the data model. Alternatively or in addition, such new information could comprise entirely new information types that could be layered into the existing model, or instead referred or pointed to as additional sources relevant information.
[1086] For example, analysis may review new variants risk correlations data, or drug efficacy and response data. In the case of the former it may be useful to have that layer of information packaged with the sequence data because of the specificity and pertinence as well as this might be information that is referenced regularly. In the latter case it might be more reasonable and efficient to include the detailed drug data as well as other drug relationships in a linked drug database.
[1087] Again referring to FIG. 9, in one embodiment a content encryption key (Keyc) 920 is generated based upon the content of the data and a subscriber key (Keys) 924 is separately generated for each of the authorized users that have permission to access the data. For example, the Keyc may be derived from a package of the header 914 and the sequence data of the biological data unit 930 being transferred (e.g., the sequence data included within the received BAM or VCF file). The biological data unit 930 comprised of the header 914 and payload 910 is encrypted using the Keyc (stage 934) and is further encrypted using the Keys (stage 938). Keeping the data secure and accessible only to those with the proper authority and under the set of specified conditions will involve the use of a set of encryption keys that will be issued to the users. Secret decryption keys are generated and transmitted separately to subscribers as part of a public-private key set.
[1088] Finally, the encrypted biological data unit 930 and public content key Keyc are transmitted from the GSC 114 to the GSR 110 and/or GDAC 116, and subsequently to a user of a subscriber system 120 (e.g. to a researcher, doctor, patient, etc.).
SEQUENCE COMPRESSION, ENCODING AND ENCRYPTION
[1089] Disclosed herein is a description of a biologically-intelligent nucleic acid sequence compression data format capable of being used in, for example, the bIQ network described above with reference to FIGS. 1-9. In one embodiment this data format is specifically designed for highly efficient compression, processing, movement, transmission and security of large volumes of DNA and RNA sequences.
[1090] Human genome sequences are 99.9% similar between individuals. If an ideal case scenario is considered then the whole genome sequence processing and transmission can be carried out with a 1000 fold less data by operating only on the difference in the data files.
[1091] For example, consider the case where the only differences between genomes were single base substitutions that are separated by hundreds and thousands of other bases. In this case, deletions and insertions do not exist and this would necessarily mean that there are no inversions or chromosomal translocations when a comparative sequence analysis of two individual genomes is carried out.
[1092] If this was the case, all reads would be mapped reads. In addition, compression performance would be of several orders of magnitude and lossless. Since this is far from reality, a reliable compression algorithm should consider substantially all types of structural variations in the sequence from simple indels (insertions and deletions that involve a small number of bases) to tens of thousands or millions of bases, that can be genomic or exogenous, involved in major primary sequence structural variations.
Sequence Compression
[1093] Early approaches to compressing nucleic acid sequences convert the four letters into a binary format. In this regard the sequence alignment map (SAM) files can be converted to a binary (BAM) format with a much smaller footprint for storage. Recent approaches to compression uses a reference sequence and a variant call format (VCF) and other methods for taking advantage of having a reference sequence and leveraging the difference in the sequences (CRAM).
[1094] In one implementation of the compression method described herein, a dictionary approach is used to generate a reference sequence and to then determine the delta between this sequence and the sequence(s) being compressed. In one embodiment biological knowledge is integrated into the compression scheme using operation codes. For example, insertions and deletions that may represent thousands of bases can be represented by a single opcode instruction.
[1095] The bIQ format disclosed herein and in the co-pending patent applications referenced herein facilitates the integration of knowledge concerning a sequence into its representation in order to improve compression and meaningful processing of the data. For instance, a base at any given position in a sequence can be substituted by any of the other three bases. However, in every case of a base substitution one of the 3 options has a significantly different biological impact than the other two.
[1096] The observation is that single base substitutions resulting in termination of translation are mostly caused by trans versions. Thus transition mutations leading to a truncated protein product with negative effects are far less likely. An alternative way to consider this is that translation stop codons are important in defining the correct mature C- terminal end of proteins.
BAM File Format [1097] The bIQ network facilitates the transmission of, for example, the sequence data generated by DNA and R A sequencing processes. These sequencing processes generate files of various file formats including, for example, the BAM, CRAM and VCF format. In one embodiment the bIQ network is capable of receiving sequence data in any of these file formats. Sequence Alignment/Map (SAM) files are the precursors of BAM files, which are essentially a binary version of SAM files. The SAM file that is generated from sequencing run is a TAB-delimited ASCII format consisting of an optional header section and a telemetric sequence data section for the raw read sequences streaming from the sequencing machine.
BAM Header Fields
[1098] The header information that is associated with BAM files is typically attached at the head of the sequence data. The lines in the header start with a '@' sign, while alignment lines do not. There are several different types of header lines with specific fields contained within each line.
[1099] For example, '@HD' is usually the first line in the BAM files to indicate the start of the header lines in the file. The '@HD' line of the header will usually have an information field for the version number of the file format being used (VN) as well as the sorting order of the alignments (SO). The coordinates for alignments are keyed and sorted by the reference sequence name field (RNAME) as well as the base position field (POS).
[1100] The next set lines in the BAM header are usually the lines that represent the reference sequence dictionary which are the lines that contain the information that defines the alignment sorting order of the BAM file. These lines are indicated by a '@SQ' line. Each of these lines has six information fields.
[1101] For example, in the BAM file header from the Broad Institute shown below, the first field in the @SQ line is the (SN) which is the field that contains the reference sequence name. Each line in the file should have a different identifier for this field. This is an information field in the header of BAM files that is used in the alignment record in RNAME next position (PNEXT) fields which is a major coordinate sort key. In the exemplary header used from the Broad chromosome numbers, X, Y and Mito are some of the tags that are used in this field.
[1102] The balance of the information fields in the @SQ line include the reference sequence length (LN), the URI for the sequence file (UR), the identification of the genome assembly that was used (AS), the MD5 checksum without spaces (M5) and the species that the sequence maps to (SP). It is interesting to note that Epstein-Barr virus is one on the species sequenced in the current example.
[1103] The next line in the header is the read group indicated by '@RG' which includes several information fields. Much of the sequence machine metadata can be associated with these header lines.
[1104] These lines include an identification number (ID). If there are multiple read group lines in the BAM file header then each line should have a unique id number. In addition, the @RG line includes the sequencing technology or platform (PL) that was used to generate the sequence. This may include but is not limited to Illumina, SOLiD, IONTORRENT, PACBIO and others.
[1105] The platform unit (PU) is a unique identifier for the actual unit used. The reference sequencing library that is used to calibrate the analyte concentration is found in the field for the library is denoted by LB and the date as well as the time of the run by indicated by DT. The sample identifier and the genome sequencing center are by SM and CN, respectively.
[1106] The program lines in the header '@PG' contain the information fields for the program identification field (ID) in the program lines. Multiple program lines may exist in the BAM header and each would require a unique program ID. The program name (PN) command line (CL) and the version number (VN) fields might be included on this header line.
Example BAM Header
[1107] The following is a header from an exemplary BAM file.
@HD VN: 1.0GO:none SOxoordinate
@SQ SN: 1 LN:249250621
UR:http ://www.Theinstitute .org/ftp/pub/seq/references/Homo_sapiens_assembly 19.fa sta AS:GRCh37 M5: lbxxxx0xxxlxxx2xxx3128 SP:Homo Sapiens
@SQ SN:2 LN:243000073
UR:http ://www.Theinstitute .org/ftp/pub/seq/references/Homo_sapiens_assembly 19.fa sta AS:GRCh37 M5:a0xxxlxxx2xxx3xxx4e SP:Homo Sapiens
@SQ SN:3 LN: 198022430
UR:http ://www.Theinstitute .org/ftp/pub/seq/references/Homo_sapiens_assembly 19.fa sta AS:GRCh37 M5:fxxxlxxx2xx3xxxx32e5 SP:Homo Sapiens
@SQ SN:NC_000005 LN:00023
UR:http ://www.Theinstitute .org/ftp/pub/seq/references/Homo_sapiens_assembly 19.fa sta AS:NC_007605.1 M5:6xxxxlxxxx2xxxx20a SP:Epstein-Barr virus
@RG ID:70004.7 PL:illumina PU:70xxx0xxxlxxx25.7 LB:Solexa-57546
DT:0xxxlxxx2xxx300-0500 SM:000-11 l-xxx-222 CN:TI @PG ID:GATK TableRecalibration VN: 100.100.2
CL : default_read_group=null default_platform=null force_read_group=null force_platform=null window_size_nqs=5 homopolymer_nback=7 exception_if_no_tile=false solid_recal_mode=SET_Q_ZERO solid_nocall_strategy=THROW_EXCEPTION recal_file=/seq/picard/ABCD0123/Cl-000.111.222.xx.37/Solexa-
55.444.33.222.recal_data.csv output_bam=null preserve_qscores_less_than=5 smoothing=l max_quality_score=50 no_pg_tag=false fail_with_no_eof_marker=false skipUQUpdate=false Covariates=[ReadGroupCovariate, QualityScoreCovariate,
CycleCovariate, DinucCovariate]
CRAM Format
[1108] There are a number of considerations relevant to the compression of nucleic acid sequence information including, without limitation, footprint, processing feasibility, efficient movement between memory elements, transmission or network and security.
[1109] There exist several potential approaches to dealing with problems attributable to the processing and storage of the voluminous amount of data expected to accompany the growing number of whole genome sequences being submitted to the public databases: 1) add more storage capacity, 2) discard some of the high-volume data ("triage"), and 3) compress the stored data using a highly efficient lossless algorithm.
[1110] Long term archiving and distribution of DNA samples worldwide is a complex operation to coordinate, with significant costs in physical storage, shipping and end-point sequencing. One additional option for dealing with increasing sequencing data is compression.
[1111] Compression of DNA sequence can leverage certain biological characteristics such as, for example, content of repetitive sequences and the comparative relationship to other known sequence. For example, CRAM is a new and efficient method for raw DNA sequence data storage using reference-based compression. This reference sequence based compression technique would likely be suitable and sufficient if sequence variation were limited to single nucleotide polymorphisms. In that case, all sequence entries would be identical length and compression, multiple sequence alignments, comparative sequence analysis and processing would be a lot easier to handle.
[1112] Although the CRAM method uses a reference for compression, it should be appreciated that the reference is suboptimal in that it is only used to compress on the order of 70% of the generated sequence reads. Moreover, the algorithm is lossy in that some read sequences are not compressed or encoded whatsoever.
Variant Call Format (VCF) version 4.1
[1113] The Variant Call Format (VCF) is a file format that is used to store the most prevalent sequence variations of various types. The current version is VCF 4.1, which involves mutation types, including single nucleotide polymorphisms, short insertions and deletions as well as larger and more complex structural variants. In addition, these files typically contain rich a set of sequence specific annotations.
[1114] VCF files are usually stored in a compressed format that can be indexed for fast and efficient random access to data when retrieving information on variant alleles from any position on the reference genome.
[1115] In order to interrogate these files, a stack of software called "VCFtools" is used to implement various utilities for processing including, for example, for slicing, merging, inter-leaving, performing format validation, comparing, annotating and performing basic statistical correlations. VCFtools and the genome analysis toolkit (GATK) developed by The Genome Sequencing and Analysis Group (GSA) in Medical and Population Genetics at the Broad Institute also provide a general Perl and Python API.
[1116] It is important to note that there are several tools that are used for mutation and variant calling. The different approaches use BAM files or other sequence read data as input for calling multiple various types of variants. Some are specific to a particular sequencing platform while others may be used across different platforms. Some tools call specific variants and other call multiple types of variants.
[1117] In one embodiment it is expected that all the variant calls will be uploaded in a VCF 4.1 format. However, the alignments and mutation calls could potentially be performed with several different tools using different probabilistic approaches to detecting sequence variations. The output data is then used to generate a VCF file for submission.
VCF Header Description
[1118] Like BAM files, the VCF file is comprised of a header and a body section. Both file types are reference-based, which is instrumental for navigating the base sequence data. However, whereas the focus of BAM files is to capture a substantial amount of information concerning the sequencing of a sample, the VCF file concentrates on the differences between the reference and sample sequence. [1119] In the case of VCF files, the header is flexible and extendable with regards to the type and amount of metadata it contains. VCF files are highly-annotated to the extent that they may apply to a particular variant, as a whole or to each genotype. In addition to genotypic annotations, others that are commonly used may include filters, genotype quality score, genotype likelihoods, dbSNP membership, haplotype data, ancestral allele, mobile element information, read depth, mapping quality and other such related information.
Optimization of a Reference Sequence
[1120] Attention is now directed to FIG. 10, which illustrates a comparative sequence analysis process 1000 used to minimize apparent biological differences between a reference and a sample sequence entry. As shown, during a first stage 1010 of the process 1000 a source database is selected having sequence entries all within the same species. Next, one entry within the database is selected (stage 1020). The biQ compression algorithm is then executed using by applying the reference sequences against the source database (stage 1030).
[1121] A dictionary compression scheme is then executed in order to identify features which may be used to update the selected reference sequence and thereby enable higher compression of the sequence entries (stage 1040). For example, stage 1040 may involve executing the compression algorithm to create a variants profile for each of the entries within the database and analyzing the resulting variants file. Such an analysis could include, for example, determining if the majority of the entries within the database have the same sequence polymorphisms.
[1122] For example, the selected sequence entry may have a nucleotide base that is an "A" at a particular location, but the majority of the entries may instead have a "G" at the specified location. The resulting variants data would indicate a transition instruction at that location (as opposed to a transversion which would result in a T or C substitution).
[1123] In the next stage 1050, the selected reference sequence is updated with the result of the data analysis described above. For example, in the scenario described above a "G" would be placed at the specified position. After the updating of the reference sequence, stages 1020, 1030 and 1040 are repeated until it is determined (in stage 1050) that further updating of the reference sequence is unlikely to yield further improvements in compression. This may be determined by, for example, comparing the current reference sequence to the dictionary entries and determining whether any changes to the reference would enhance compression performance. That is, the reference sequence will essentially be reduced to a sequence having a minimum number of mutations or structural variants. [1124] In addition to the instant updating of reference sequence, modifications may be made to the type of information that is collected and maintained in the headers of these sequence files (e.g., BAM and VCF sequence data formats).
[1125] When the syntax for validation and verification of sequence files is updated, corresponding adjustments are made to the data verification protocol. The updating of reference sequence information is synced with any metadata and annotation changes that may occur in the various layer of information related to the data.
[1126] It should be appreciated that other compression theories could be employed where compression is achieved without having a reference as the basis for retaining highly- redundant sequence information. Compression techniques that are not reference-based can be applied to the data set and this can be coupled with an encryption schema that is consistent with the proposed codec model. For example, a dictionary approach could be used as part of a compression scheme in combination with other methods for compression that would achieve a suitably compressed dataset that optimized for security, privacy, 10 and transmission.
[1127] In addition, there could be more than one selected reference sequence used for compressing the same set of sequence data. The particular reference sequence being referred to, will be specified in the instruction database entry. For example, if there were two control references and entry one referred to reference #1 while entry two referred to reference #2. The given set of bits in each entry would be the reference sequence ID, where number represents the controlled sequence number.
[1128] The sequence that is used to calibrate the data need not be selected from one of the entries. It could simply be generated or initially assigned by looking at the common entry for each of the positions. For example, if at position 100 more than 50% of the entries have a C then the reference should have a C at that position. In order to develop the minimum reference sequence, substitute a C for recursive optimization of the ideal sequence used for referencing. Doing this for the most common variants would find that the ideal minimum sequence would generate a highly-compressed database of mapped and unmapped raw reads.
Operation Code Function
[1129] It should be understood that a large percentage (i.e., approximately 70%) of the raw reads from existing next-generation sequencing machines are mapped reads while the remaining 30% of the reads cannot be mapped. The CRAM algorithm efficiently compresses the mapped reads, and then performs de novo assembly to align, map and compress the pool of unmapped reads. [1130] In contrast, when using the bIQ opcode instruction method (disclosed in the co-pending applications referenced herein) to compare the sequence elements present in one sample versus another, the compression algorithm will expand to include more advanced operations. In this way the algorithm becomes increasingly diverse with regard to biological relevance and the details of the operation for that comparison of the DNA sequences. For example, when two sequence entries are compared with each other there is an opportunity to take advantage of how they relate to each other to improve the algorithm. Two sequences that are compared have similarities and differences that can become intimately involved in operation coding of DNA sequence data. For example, in this case one sequence as relates to the other allows for one entry to serve as the control reference sequence. This provides an opportunity to use this method to compress the relative differences using biological instructions.
[1131] The information that is known about the nature and phenotypic outcome of a structural variant in the sequence can be useful in enhancing the quality and extent of a compression scheme. For example, certain chromosomal rearrangements (known translocations) or well-defined large deletions or insertion of readily identifiable viral DNA sequences may be integrated into compression as a single compression element.
[1132] Referring now to FIG. 11, a flowchart is provided of an alternate encoding and encryption process 1100 capable of being employed within the network 100. The process 1000 employs the dictionary compression and reference sequence modification techniques described above. In an initial stage 1100, sequence reads are received from a next-generation sequence machine. An optimized reference sequence is then generated from these sequence reads (stage 1120). To the extent the approach described above with reference to FIG. 10 is used to generate the optimized reference sequence, a dictionary is created (stage 1130). Based upon this optimized reference sequence, biological data units are encoded, assembled and stored within a GSR (stage 1140). The stored biological data units are then encrypted (stage 1150) prior to being transferred to a subscriber system (stage 1160).
[1133] With regard to optimization of the reference sequence (stage 1120), deletions or insertions can be applied to the selected minimum reference sequence as an updated version for improved compression. Consider truncations as deletions at the 3 ' end of a gene or in other words a premature termination codon (PTC) in the middle of the coding sequence resulting in a protein or polypeptide product with a shortened carboxyl terminus which usually does not function normally or might have toxic effects in the cell. In addition, a specific control reference sequence based on a minimum delta value may be selected, and then a dictionary may be generated from the resulting dataset. For example, all the minor variant alleles in BRCAl gene (not limited to any one gene) that correlates with all known clinical and pharmacological effect can be used in a dictionary scheme.
[1134] Each mutation event within each sample entry that results in a phenotypic effect, as well as silent mutations that are common in several entries, can be placed in a dictionary using this approach for further compression of the sequence data. As a result, the algorithm is able to take advantage of specific difference values from the references that are common to multiple entries.
GENETORRENT™ DATA TRANSFER
[1135] As was indicated above, sequence files generated by a GSC 114 may be securely transferred to the GSR 110 in parallel fashion through the GeneTorrent™ data transfer application. In the embodiments of FIGS. 1-5, this application is instantiated as the GeneTorrent™ application 430 installed on the GSR 110 and the GeneTorrent™ upload client 230 installed on a GSC 114. For operation involving data downloading, the GeneTorrent™ application 430 cooperates with a GeneTorrent™ download client installed on a subscriber system 120.
[1136] In upload mode, the GeneTorrent™ application 430 and a
GeneTorrent™ upload client 230 cooperate to effect submission of a set of one or more sequence data files (e.g., BAM files) to the GSR 110. In one embodiment effecting such a submission involves adding the submission to one or more catalogs maintained by the GSR 110 and/or DCC 124, verifying the associated metadata to be uploaded, storing and indexing the metadata for search, storing the sequence data in replicated persistent storage within the GSR 110, and setting access rules based on, for example, consent agreements associated with the tissue samples from which the sequence data files are derived.
[1137] In download mode, the GeneTorrent™ application 430 and a
GeneTorrent™ download client within a subscriber system 120 cooperate to retrieve a bundle of one or more sequence data files from the GSR 110. In one embodiment retrieving a sequence data file from the GSR 110 includes verifying the requesting user is authorized to view the data within the file, storing the sequence data in local persistent storage at the subscriber system, and verifying that the transfer was performed correctly.
[1138] In both the upload and download modes, the actual transfers of the sequence data files are preferably authenticated (i.e., only users associated with the appropriate permissions relative to the file may access its sequence data) and authorized (i.e., only users authorized in view of project- specific or other rules maintained by the GSR 110 and/or DCC 124 are permitted to download the identified sequence data file). Such transfers are also preferably secured in that the sequence data is strongly encrypted when transiting the network and reliable (i.e., files may be presumed to have been transferred essentially intact and uncorrupted unless the GeneTorrent™ application provides an indication to the contrary).
[1139] In one embodiment each GeneTorrent™ client provides a command line interface to the end user. Through this interface one of two operating modes typically may be invoked: upload and download. When operative in upload mode, the GeneTorrent™ client operates in concert with the GeneTorrent™ application 430 to upload files to the GSR 110. When operative in download mode, the GeneTorrent™ client and the GeneTorrent™ application 430 cooperate to download files to the client from GSR 110. In addition, the GeneTorrent™ application 430 may enter an "actor" mode during which multiple GeneTorrent™ server instances are created for use in performing parallel transfers to/from the GSR 110.
[1140] During operation of the system 100, the GeneTorrent™ application
430 executes on one or more application processors to manage file transfers to from GeneTorrent™ clients at GSCs 114 and to/from GeneTorrent™ clients at GDACs 116 . In one embodiment multiple GeneTorrent™ server processes executing on the application processors listen for download requests, and multiple GeneTorrent™ upload actor instances are spawned when an upload request is received from a GSC 114 (or, in certain cases, from a GDAC 116). In the present embodiment, application server instances ("AppServer Instances") executing on the application processors may be configured as either GeneTorrent™ upload actor instances or GeneTorrent™ download actor instances. The allocation of AppServer Instances among GeneTorrent™ upload and download actor instances may be made in accordance with, for example, the number and type of upload and download requests received from peer GeneTorrent™ instances at the GSCs 114 and GDACs 116. For example, during periods in which a higher number of download requests are received from GDACs 116 relative to the number of upload requests from GSCs 114, more of the AppServer Instances executing on the application processors may be configured as GeneTorrent™ download actor instances. Conversely, more of the AppServer Instances executing on the application processors may be configured as GeneTorrent™ upload actor instances during times in which a relatively larger number of upload requests are received. The system dynamically load balances across the application processors to allocate capacity for multiple upload and download processes, allowing it to better respond to the normal fluctuations in GSC and GDAC workflows. Moreover, performance with respect to a particular GeneTorrent™ upload or download session may be enhanced by allocating a relatively larger number of GeneTorrent™ actor instances to such process.
File Submission
[1141] In an exemplary embodiment Analysis objects are the primary container for submitting and downloading sequence data. Each Analysis object may include one or binary sequence Alignment/Mapping (BAM) files and is associated with an XML metadata file. The payload of each BAM file contains both the sequencing data (in bases, quality scores, and read names produced by the sequencing instrument) and read placements with annotations about strand, alignment, and quality features. Raw sequence read files, such as .srf files, can also be submitted along with the BAM files. In the exemplary embodiment each data submission includes a file of submission metadata compliant with the SRA 1.3 XML schema.
[1142] When making a new data submission a user will create and save a user authentication key via an authentication Web page hosted by or in association with the GSR 110. The user may then invoke an application executed by the GSC 114 to create a unique identifier (UUID) to associate with the Analysis object. Assigning a UUID to the Analysis object ensures that the submission can be subsequently uniquely identified relative to all other submissions provided to the GSR 110. The user may then create a directory at the GSC 114 and copy the XML metadata file (e.g., "analysis.xml") and sequence data files relating to the Analysis object into the directory. In one embodiment such sequence data files may include additional files of type other than BAM, such as legacy formats or proprietary formats containing raw read data. For example, the RNA-seq raw read data could be submitted along with the alignment data in the BAM. In one embodiment these additional files will be uploaded, stored and downloaded along with the BAM file as part of the same Analysis object.
[1143] In one embodiment the GSR 110 maintains a list of users permitted to upload new submission sequence and metadata. This list may be maintained by, for example, an out-of-band interaction between personnel representing each GSC 114 and operations staff of the GSR 110. Specifically, the user name (and optionally a project group) will be identified within the GSR 110 as the owner(s) of the associated sequence data files. This enables a check to be performed during the submission process to confirm that the user's group membership matches or is otherwise appropriately associated with the GSC 114 from which the submission is being received (e.g. users associated with GSC "BI" can only submit metadata for centername="BI"). If a user requests modification or suppression of a submission (thereby making the associated sequence data file(s) unavailable for download), the GSR 110 will verify that the user is a member of the group that owns that submission.
[1144] Once a user has been authenticated (i.e. proven to be who they say they are), access to sequence data may be further constrained by applicable project consent authorization constraints. For example, consents from owners of sequence data relating to those users eligible to download such data may be received by the GSR 110 in one or more files on a regular (e.g., daily) basis. The GSR 110 may then update one or more internal authorization tables to reflect any changes. In one embodiment each file of sequence data within the GSR 110 is associated with a project coordinated by the DCC 124 through the identifier (e.g., UUID) assigned to the biospecimen from which the sequence data file was derived. The GSR 110 may receive this tag as part of the sequence data submission process. In one embodiment the GSR 110 may then confirm with the DCC 124 that the identifier is valid. The DCC 124 may also provide information on whether the sample has been redacted.
File Upload
[1145] As is discussed below, uploading of a new submission of sequence- related data generally involves several operations. First, the user at the applicable GSC is authenticated and the submission "package" of files to be uploaded is validated. Next, the Analysis object with associated metadata is added to a repository catalog associated with one or both of the applicable DCC 124 and the GSR 110. The set of one or more sequence data files included within the submission package are then transferred to the GSR 110. The correctness of the transfer may then be verified, and its legitimacy may be confirmed with reference to information maintained within the DCC 124. The upload process is then generally concluded by setting appropriate authorizations for access to the information within the new Analysis object.
[1146] During an upload session, a user will typically transfer a plurality of files related to sequencing of a sample to the GSR 1 10. For example, in one embodiment these files, which are all associated with the same Analysis object, may include one or more XML files containing metadata about the sequence data files of interest. The Analysis object may, but need not, also include one or more sequence data files (e.g., BAM files) associated with the metadata.
[1147] In one embodiment the GeneTorrent™ upload client 230 will first pass the XML metadata files of the Analysis object to the GSR 110, where consistency checks and other types of validation will be performed. During this stage all necessary validation is performed in order to ensure that the metadata and BAM file headers are complete and correctly formatted. The GSR 110 will validate the structural metadata required to identify and manage the sequencing data and may also perform any project- specific validation rules required to ensure consistency between the metadata and BAM headers. In the event such validation is successful, a metadata client module at the GSC will generate a manifest.xml file that can be passed to the GeneTorrent™ client 230 for use in uploading the sequence data files of the Analysis object to the GSR 110. In the event that errors are found in the submission, in one embodiment a complete error log will be returned with descriptive errors to help isolate the failures.
[1148] If the metadata upload is successful, the GeneTorrent™ client 230 will locate all of the sequence data file(s) (e.g., BAM file(s)) listed in the analysis. xml file within the directory created during the submission stage. Next, the GeneTorrent™ client 230 will connect to an API provided by the GSR 110 and pass a GeneTorrent™ object file ("GTO), which is used by a GTO Executive™ subsystem to initiate the upload. The GTO Executive™ subsystem will identify the address of the upload user and generate the required digital certificates. Once this has occurred the GTO Executive™ subsystem will spawn multiple GeneTorrent™ upload actor instances, which will begin uploading a first of the one or more sequence data files listed in the analysis. xml file. In particular, the GeneTorrent™ upload client 230 then segments the file and begins parallel file transfer sessions of the file pieces over SSL. The GeneTorrent™ protocol will manage transmissions errors on any of the file pieces and will reassemble the file at the GSR 110.
[1149] Once the transfer is complete, the GSR 110 will perform a series of validation steps prior to making the data available for download. In one embodiment these steps may include, for example, computing the MD5 checksum and comparing it against the value in the XML metadata file, verifying the name of the transferred sequence data file matches the name in the XML metadata file, and validating that the headers of the transferred sequence data file match the header information in the XML metadata file. In one embodiment the DCC 124 will be queried to determine if the sample is valid and is in an active state (e.g. has not been redacted). If the sample cannot be found, the state will be set to "verifying sample". If the sample is found, but has been redacted, the state will be set to "suppressed". In both cases, the GSR 110 will periodically poll the DCC 124 to see if the state has changed.
File Download [1150] In one embodiment a two-phase process is used to download the biological data units of files associated with Analysis objects within the system 400. Namely, during a first phase one or more sequence files of interest are identified, and during a second phase the biological data units associated with the identified sequence files are transferred from the GSR 110 to a subscriber system 120 and/or GDAC 116 for storage. For each Analysis object, the GeneTorrent™ file transfer application 430 will coordinate retrieval of related metadata from the metadata database 512 during the first phase and the biological data units of all associated sequence data file(s) from the GSR 110 during the second phase.
[1151] During the first phase, a user may issue a metadata-related to query to the GSR 110. In an alternate embodiment such queries are directed to the DCC 124. The user may specify values for one or more metadata attribute fields within the query. In response, the GSR 110 may respond with zero, one, or more URIs referencing Analysis object(s) having metadata matching the specified attribute values. Users may search for the most commonly accessed attributes by name (e.g. "disease_type=OV"), or may use free-form searches for text strings within the XML metadata file provided as part of the sample submission.
[1152] During the second phase, the URIs may be passed to a GeneTorrent™ download client at the subscriber system 120 or GDAC 116 for storage . Next, the GeneTorrent™ download client 524 interacts with at least the GeneTorrent™ application 430 to transfer the identified sequences. Finally, optional validation checks are performed by the GeneTorrent™ download client to ensure proper download and content format.
[1153] Further details concerning the GeneTorrent™ data transfer process are provided below.
DATA COORDINATION, USER AUTHENTICATION AND CONDITIONAL ACCESS
Data Coordination
[1154] Today there exist systems capable of, for example, coordinating the identification of a patient with a code (barcode) for the tissue taken from that patient. This tissue is used to prepare DNA for sequencing. The DNA sequences are used to generate sequence files which are given universal identification numbers (UUIDs).
[1155] The above -referenced content-aware bIQ network provides a system to partition all of the different types of data in such a way that is functionally consistent with the way that it is done currently. As is described herein, such a network may also be further configured to facilitate tracking, integrating and coordinating (e..g, from birth) substantially all of a person's relevant electronic health information including next-generation genomic and other omics data from highly distributed databases in a single step.
[1156] Consider a case for a difficult cancer patient. Today, a doctor takes a sample of tissue from the patient and labels it and ships it to the Biospecimen Core Resource (BCR) where it is assigned a secure barcode associated with patient X. Once the DNA or RNA is purified and sent to the GSC, the barcode is converted to the unique ID used by researchers and analysts to coordinate the sequence with other data including metadata of several types.
[1157] In contrast, a doctor with access to the content-aware bIQ network uses one integrated system that is capable of monitoring and coordinating all of these different data types. The process of coordinating the data is obviated by the content-aware network. As an example, it may currently require several months to institute desired changes to a file containing genomic sequence data (e.g., an update to the header of a BAM files at a data coordination center). As a result, the not-yet-coordinated data sits in a staging area and not accessible to interested users at a GDAC. In contrast, the bIQ network enables coordination of networked genomic data in a number of different ways. For example, changes to a reference sequence, or modification of the format that is used to store and transmit the sequence data, can be easily facilitated by the bIQ network.
Correlation of sequence data with phenotypes
[1158] Consider a network which is configured in such a way that even though databases are geographically dispersed and contain different types of data with varying levels of accessibility correlation analysis can be carried out.
[1159] For example, there are currently over 650 different genes that have been associated with Alzheimer's disease. The gene commonly known as ApoE has been shown to be important in onset and progression of the disease and in particular the epsilon 4 allele.
[1160] Since all of the data that is accessible on the network can be easily located and the content is known it would be simple to make queries on special population data and generate high confidence statistical data. For example, how many subjects with 2 copies of ApoE epsilon 4 alleles also have minor allele variants in a given set of other associated genes and also have a certain range score on mild cognitive impairment tests.
[1161] A network user with relevant algorithms at a GDAC may wish to send a query to find of those subjects with the ApoE marker how many had been treated with a particular drug for a different illness involving overlapping biological pathways. This might be an off- label drug that could be highly effective for treating certain type of stage of Alzheimers. [1162] The metadata that is available on the network should be made useful in making statistical corrections to determine confidence in finding any correlations can be made with MCI scores or brain images (MRI, PET, etc.). All of this data will be distributed across the network and results are aggregated to publish a result.
[1163] Another level of correlation of this data may exist when DNA and RNA are prepared at various BCRs by different technicians and sequenced at different GSCs on different platforms and mapping and variants calling done by different tools correlations analysis can be done to establish a standard of quality. For example, are certain machine errors increased at a certain GSC at certain times the day or when a particular technician is working.
[1164] Correlations can be done on essentially any on data point available on any individual. For example, if enough data was available on the network it would be reasonable to extract meaningful correlations from nutritional, environmental and other such data with genomic sequence data.
Controlling privacy of data on bIQ
[1165] In an exemplary embodiment, data that is stored on the bIQ network is partitioned a manner that is consistent with maintaining the highest level of privacy of data.
[1166] For example, the network may be configured to permit individuals to be able to give dynamic consent to anyone requesting access to their molecular expression and genomic sequence data that is kept at a GDR.
[1167] In this case, an individual's data might be stored at a GDR and each query request for access to that particular set of files would alert the owner of the data (the patient). The owner can grant access to the data using several different bIQ network compatible devices including but not limited to a cell phone.
[1168] Privacy is also enhanced by the manner in which the relevant data will be compressed and encrypted for transmission and to facilitate other transactions. For example, certain data that is intended to stay private can be encrypted and compressed in a manner that is consistent with generating different levels of privatized genomic variants data.
[1169] Finally, data on the network can be accessed and processed by moving applications to the stored data rather than by moving the data from storage or otherwise copying the data. In this case, data can be accessed or information about the data can be conditionally accessed by network queries by authorized users. [1170] For example, the privacy of the data can be controlled, partitioned and filtered based on many features including but not limited to the type of the variant SNP versus indels versus copy number variations versus chromosomal rearrangements.
[1171] In addition, alternative splicing variants, triplet expansions, repeat sequence, methylation profile and other related types of modification or variants data may reveal non- obvious genotypic or phenotypic information that should be kept private. For example, the bIQ network may be configured to permit a specific given set of minor alleles to be accessible to one set of users and but not to other users. There may even exist a scenario where certain regions of the genome are requested by the genome owner and/or subject to remain private from everyone including the owner and/or subject.
Data validation
[1172] An evaluation of the data files that are actively transmitted on the network can be made relatively straightforwardly, since in an exemplary embodiment the data is transmitted over the network in a common format.
[1173] In one embodiment a mechanism is created to coordinate the validation process. Such a mechanism would involve a means to synchronize the sequence data content, information in the header, and the various sources of metadata collected at the various steps in the work-flow of the molecular data. For example, the data that is generated at a BCR is stored in files with metadata information that relates directly to the type of biological specimen that is being used; organ type, tissue type of cell type for example. There are other types of information about the process that was used to prepare the sample or visual properties of specimen or who prepared samples or where and when the preparation was done that might be included in the header space.
[1174] The particular specimen is given a unique barcode identification and aliquots are made and used to prepare purified DNA and or R A sequences. Raw sequence reads are generated from the sequencing machines are mapped to a reference as BAM files. In one embodiment these alignment files also contain their own header information as a part of the format that is validated during ingestion into the bIQ network. In such an embodiment it may be advantageous to implement a network-wide data file validation protocol. For example, if the file is corrupted or if required information is omitted from the header, then the destination performing the file upload procedure will be prompted with an error message indicating that the data to be uploaded is not valid. Possible reasons for the invalidity of the data may be included within such error message. [1175] In this scheme, invalid sequence data is not uploaded from the GSCs and therefore not included in data analysis at a GDAC. In one embodiment a straightforward validation process is utilized; namely, files that are not consistent with the standard encode format will not be ingested. In this embodiment the bIQ network accommodates only properly formatted and encrypted files for transactions.
EXEMPLARY IMPLEMENTATION OF GENETORRENT™ DATA TRANSFER PROTOCOL
Background
[1176] The transmission control protocol ("TCP") is known to use the additive increase/multiplicative decrease algorithm to avoid congestion and control bandwidth usage. Unfortunately, this aspect of TCP can impede the transmission rate of very large sequence data files, even on high-speed networks.
[1177] A "peer-to-peer" network of computers harnesses the bandwidth and computational power of the computers participating in the network. This contrasts with conventional "client-server" approaches, in which computing power and bandwidth are concentrated in a relatively small number of servers. Such peer-to-peer networks may facilitate the transfer of files through a set of connections established between participating peers.
[1178] BitTorrent is a popular file distribution program currently used in peer-to-peer networks. A peer within a BitTorrent system may be any computer running an instance of a client program implementing the BitTorrent protocol. Each BitTorrent client is capable of preparing, requesting, and transmitting any type of computer file over a network in accordance with the BitTorrent protocol. BitTorrent is designed to enable distribution of large amounts of data without consuming correspondingly large amounts of computational and bandwidth resources.
[1179] To share a file or group of files, a BitTorrent peer first creates a small file called a "torrent" (e.g. "Filename.torrent"). The torrent file contains metadata about the files to be shared and also includes information about a component, termed the "tracker", that coordinates the file distribution. Torrent files are generally published on a website or other accessible network location. The tracker maintains lists of the clients currently participating in the torrent. A peer desiring to download a file of interest must first obtain a copy of the corresponding torrent file and connect to the specified tracker. The tracker then informs the peer from which other peers pieces of the file of interest may be downloaded. [1180] The peer distributing a data file generally treats the file as being comprised of a number of identically-sized pieces, usually with byte sizes of a power of 2, and typically between 32 kB and 16 MB each. The peer creates a hash for each piece, using the SHA-1 hash function, and records the hash value in the torrent file. When another peer later receives a particular piece, the hash of the piece is compared to the recorded hash to test that the piece is free of errors. Peers that provide a complete file are called "seeders", and the peer providing the initial copy of the file may be called the "initial seeder".
[1181] The exact information contained in the torrent file depends on the version of the BitTorrent protocol being utilized. In general, torrent files include an "announce" section, which specifies the URL of the tracker. Torrent files also include an "info" section, which contains suggested names for the files, their respective lengths, the piece length used, and a SHA-1 hash code for each piece. This information is used by requesting peers to verify the integrity of the data received.
[1182] With respect to a given file, the tracker maintains records of which peers are "seeds" (i.e., a peer having the complete file(s) being distributed) and of the other peers in the applicable "swarm" (i.e., the set of seeds and peers involved in the distribution of the file(s)). During the distribution process peers periodically report information to the tracker and request and receive information concerning other peers to which they may connect.
[1183] Users interested in obtaining a file or files using BitTorrent may, using a web browser installed on a local machine, navigate to a website listing the torrent and download it. Once downloaded, the torrent may be opened in a BitTorrent client stored on the local machine. Once the torrent is opened, the BitTorrent client establishes a connection with the tracker. At this point the tracker provides the BitTorrent client with a list of peers currently downloading the file or files of interest.
[1184] If a BitTorrent client happens to be the first such client interested in a file associated with a torrent, for at least some period of time such client may be the only peer within the swarm and thus connects directly to the initial seeder and requests pieces of the file. As other peers join the swarm, the peers exchange pieces with each other in addition to downloading pieces from the initial seeder.
[1185] Unfortunately, in the case of very large files it will generally be rather burdensome for the initial seeder to respond to requests for file pieces from multiple requesting peers. Moreover, limitations on the processing and input/output resources of the initial seeder may impede the efficient and rapid distribution of very large files. Overview
[1186] The following sections describe a system and method for secure, high-speed file transfer which is capable of overcoming the disadvantages of TCP and existing peer-to- peer protocols with respect to the distribution of files of very large size. Like other peer-to- peer file distribution systems, the disclosed GeneTorrent™ high-speed file transfer system utilizes a tracker to enable a plurality of peers to cooperatively distribute a file of interest. However, in one aspect the GeneTorrent™ system incorporates a Transactor which is integrated within or otherwise operates in conjunction with the tracker. The Transactor is a program which operates to immediately identify and make a record of those clients (i.e., actors) which request a certain file of interest (e.g., "file X"). The Transactor will also generally be configured to determine the authentication and entitlement of each actor based on authorization rules and using a secure key distribution scheme.
[1187] In one embodiment the Transactor clusters individual actors which have requested file X into a cast of participating actors comprising an affinity group. The Transactor may determine which actors are assigned to a particular cast based upon, for example, the file requested, the location of the file (i.e., with which actor(s) the file is currently stored), as well as the credentials of the actors requesting access to the file. Once an actor has been directed to a particular cast, the actor exchanges messages with other actors within the cast in order to determine and receive the portions of the file of interest currently possessed by the cast. Stated differently, the Transactor proactively directs a requesting leecher actor to a feeder affinity group such that the leecher receives as much of the requested file as possible without, to the extent possible, incrementing the burden on the seed of file X.
[1188] In the case of very large files, such as files containing genomic or other biological sequence information, the GeneTorrent™ approach effectively "parallelizes" the transfer of file information and reduces the burden on the initial seed or seeds of file X. Moreover, the use of parallel streams within the GeneTorrent™ system minimizes the effect of a multiplicative decrease in the speed of any one stream resulting from the characteristics of TCP discussed above. Thus, use of the GeneTorrent™ approach may reduce the likelihood of bottlenecks developing around overburdened seed servers in connection with the transfer of very large data files.
[1189] The use of such parallel streams also enables the separate encryption of each individual file segment, thus obviating the need for re-encryption and retransmission of the entire file in the event of corruption of an individual segment. Particularly in the case of very large data files containing sensitive information (e.g., files containing genomic sequence information), this aspect of the GeneTorrent™ approach may offer considerable advantages relative to existing methods of file distribution.
Detailed Description of the GeneTorrent™ Data Transfer Protocol
[1190] At this early stage in the experimental development of the human genome biology and next generation sequencing (NGS) technology, there is yet still much to be discovered and understood.
[1191] For example, one major rate limiting step involves the ineffectiveness on the part of the research community to make decisions as a group to set the highest standards for the genomic data space. For example, it may be particularly important to develop standards around the quality of service that is used to touch genomic, transcriptomic, proteomic and other large volumes of omics data. Moreover, this type of biological data will typically require extreme security considerations. The dataset might contain genotypic and phenotypic information that could have profound effects on an individual if it is breached.
[1192] This information also requires special consideration with regards to data integrity and form; that is, the data need high-level validation. It is important that the data is transferred with the highest fidelity. In addition, these are very large datasets where failed transmissions can be costly in time.
[1193] Finally, some of this data will need to be conditionally accessible to different sources in various regions for various reasons. For example, if certain regions of the genome are required for breast cancer analysis the regions associated with other phenotypes and or diseases can remain inaccessible.
[1194] The approaches disclosed herein use a method to structure GeneTorrent™ Object (GTO) files so as to allow multiple instances of parallelized streams to be sent and received by two or more actors.
[1195] A number of innovations are disclosed herein, including :
• A protocol to facilitate high-speed transfer of very large biological sequence data files.
• A file structure for facilitating high-speed file transfer from one actor to another over a network.
• A method to apply an encryption scheme to parallel streams of N instances of the same GTO file from multiple servers. • An architecture of a hub server designed for use within a GeneTorrent™ environment.
• A layered encryption scheme for various data types that is made accessible by conditional access control.
• An entitlement control system public/private key distribution protocol used within a GeneTorrent™ system to regulate authorization of actors and authentication for access to certain .gto files.
• A dynamic consent protocol that is integrated into the entitlement control system.
GeneTorrent™ Architecture & Characteristics
[1196] As is discussed below, in embodiments of the GeneTorrent™ system files are fragmented into pieces for parallel independent transfer; the location of multiple sources ("seeders") for a file are adverstised; and actors or other peers exchange protocol messages containing metadata about files. In addition, the GeneTorrent™ approach contemplates use of a number of unique techniques, including methods for:
• limiting membership in the "swarm" of systems that can be "seeding" a file;
• requiring each pair of "actors" exchanging data to reciprocally authenticate;
• encrypting data in transit using strong, standard cryptographic technology; and
• constraining peer-to-peer interactions to authenticated users with authorization to perform the requested "seeding" or "leeching" operations on the requested data.
[1197] In one embodiment user- level authentication and dataset authorization is performed before peers can initiate a GeneTorrent™ transfer. In this embodiment a GeneTorrent™ peer desiring to initiate a transfer first contacts a control component (hereinafter also termed a "GT Exec") on a GeneTorrent™ repository and passes the user credentials. The GT Exec authenticates that the credentials have not expired and correspond to a known user. The GT Exec may then further verify that the user is authorized to perform the requested action (e.g., upload or download) on the specific data files identified in the request.
GeneTorrent™ Object File Transfer - Multiple Parallel Streams
[1198] In one aspect GeneTorrent™ enables multiple sending actors to transfer file pieces to multiple receiving actors over parallel streams. This approach has several advantages. For example, parallel M:N transfers avoid many of the bottlenecks that occur in 1 : 1 transfers, such as issues with disk I/O, CPU utilization, large bandwidth-delay products in the WAN, and other side-effects of transferring very large data sets. Error detection and error recovery are built in, automatic and very robust. The protocol is content-agnostic, allowing data file formats to evolve without impacting the underlying transfer mechanisms The protocol scales asymmetrically - M:N transfers for high volume producers and 1 :N downloaders for the periodic user are supported by the same application. The protocol is capable of saturating the available network bandwidth and reacts well to dynamic changes in the congestion levels in the transport network
[1199] The GeneTorrent™ protocol is capable of rapidly and efficiently transmitting large biological sequence data files. As a result, in one embodiment a dynamic encryption key distribution system is integrated into the file transfer system to faciliate secure transfers. This allows for encryption of data in multiple layers that can be controlled using a hierarchical entitlement scheme. For example, one GTO file can be encrypted in a format that allows for multiple downloaders to access different layers of data from the files.
[1200] Attention is now directed to FIG. 12, which provides a high-level of the architecture of a GeneTorrent™ system configured to form multiple instances of a GTO file so as to enable a cluster of servers to tranfer parallel streams of file information to a user system. Although not shown in FIG. 12, integrated within or layered "on top of the architecture is a higly secure encryption system.
Gene Torrent Object Files
[1201] In one embodiment an actor first locates a Torrent file describing the target data as an initial step in participating in a GeneTorrent™ parallel file transfer. Such a Torrent file may comprise a static "bencoded" dictionary including the Announce URL, an info dictionary, and other optional fields. In one embodiment GeneTorrent™ uses dynamic one-time Gene Torrent Object files to bootstrap a secure and encrypted file transfer based on bi-directionally authenticated SSL sessions.
[1202] In a GeneTorrent™ system, the Torrent file will generally be structured in order to accommodate the efficient transfer of very large files. For example, the task of generating the SHAl hashes for all the "pieces" of a very large file would be computationally expensive and impose an unnecessary I/O burden on the local storage system. Accordingly, rather than regenerating new SHAl hashes for every file piece each time a user downloads the file, in one embodiment one or more seeders cache the torrent data for reuse. Each large data file will have an associated static Torrent file which will be stored in the same directory. This torrent file may comprise a "normal" Torrent, i.e., it may lack SSL certificate information. Such certificate information and any other additional data fields may instead be dynamically inserted into the Gene Torrent Object file at the time of a download request, thus creating a one-time -use Torrent with authentication keys.
Transactor
[1203] As discussed above, the Transactor at least partially enables a GeneTorrent™ system to transmit a file of interest in multiple parallel streams to a requesting entity. As discussed above, in one embodiment the Transactor clusters individual actors which have requested file X into a cast of participating actors comprising an affinity group. The Transactor may determine which actors are assigned to a particular cast based upon, for example, the file requested, the location of the file (i.e., with which actor(s) the file is currently stored), as well as the credentials of the actors requesting access to the file. Once an actor has been directed to a particular cast, the actor exchanges messages with other actors within the cast in order to determine and receive the portions of the file of interest currently possessed by the cast. That is, a requesting leecher actor is proactively directed to a feeder affinity group such that the leecher receives as much of the requested file as possible without, to the extent possible, incrementing the burden on the seed of file X.
[1204] Attention is now directed to FIGS. 13-18, which illustrate exemplary operation of one embodiment of a Transactor. As shown in FIG. 13, Actor 1 makes a first request to the GeneTorrent™ network for file X. In the present example it is assumed that the only copy of file X is stored at the Repository.
[1205] Referring to FIG. 14, the Transactor then locates the actor(s) hosting file X on the network after authorization of actor 1. Since Transactor has entitlement rights Actor 1 is assigned to the Cast X cluster. At this moment Actor 1 is the only actor in the Cast of X. Actor 0 prepares a GTO file and starts sending random pieces of the file X to Actor 1.
[1206] Turning now to FIG. 15, in the next moment Actor 2 makes a request for file X. Because the Transactor has access rights and is able to assign actors to a particular cast based on the file request, Actor 2 is immediately assigned to Cast X. By this assignment, the Transactor tell Actor 2 to join Cast X and exchange messages with other actors in the cast in order to determine which parts of file X are possessed by the cast. At this point a GeneTorrent™ instance is initiated with those pieces of file X from Actor 1. Plan to take the other pieces of the file X from either Actor 0 or Actor 1 by staying in constant communication with each other until the transmission request is complete. [1207] Referring to FIG. 16, a third actor makes a request for file X, is assigned by the Transactor to the appropriate cast, and begins downloading those instances of file X that are among the pool of actors in Cast X. The Transactor is thus able to direct each actor to a related cast of actors so as to not overburden the original source of file X. That is, the Transactor directs leechers to a feeder affinity group in order to obtain those portions of a file of interest available from the group without chokepoints.
[1208] As represented by FIG. 17, all actors in the cast may be uploaders as well as downloaders at the same time since random pieces of the file X are being served among all cast members. Since authentication keys are distributed with the parallelized file transfer, all cast members can be confident that all instances of file X that are served among members are from the original source repository.
[1209] Turning to FIG. 18, it should be appreciated that file X could be a file in multiple locations when the request is made to download this file on the network. The GeneTorrent™ system can achieve multiple instances of the same file because of the key distribution used to certify copies of file X that it is from one original file.
[1210] GeneTorrent™ can generate multiple instances of secure parallelized streams from a certified copy of file X from one or more actors to one or more actors.
[1211] The line of authentication can be to on original copy. The Transactor adds the data certification on top of a "smart-tracker" that tracks not only who have which file but also tracks biological and clinical knowledge about the files (Biolntelligence).
[1212] For example, using existing protocols it may not be possible to track a specific BAM file and which actors have it or are in the process of obtaining it. However, the SmartTracker may track file specific information contained in these sequence data files on variants, gene expression, copy number variations as well as any disease that might be associated.
[1213] In addition, clinical and phenotypic information will be tracked and can be associated with the genome and transcriptome data. In one embodiment the Transactor uses the SmartTracker, conditional access control and a robust encrypt key distribution to assign high affinity actors to a cast based on file X request and essentially on any field of information contained in the sequence data file.
[1214] For example, in addition to Transactor assigning actors to a cast because they are all interested in a particular file X, the actors might be clustered based on information about the file. [1215] For example, if the file X is the genome sequence for an individual with disease Y and if it is known that mutations in certain genes on chromosome 17 are associated with the disease then Transactor can be more effective in building out a well-defined affinity cast in the early stages of an impending transmission request load to limit any bottleneck.
Bi-directional Authentication
[1216] The GeneTorrent™ protocol provides security for biological sequence data in transit by running a well-established protocol over Secure Socket Layer (SSL) connections between the trusted GeneTorrent™ actors involved in the transfer of file pieces on the bIQ network. In one embodiment, the SSL connections will be bi-directionally authenticated in the manner described below.
[1217] Referring to FIGS. 19A-19B, In the upload case the GeneTorrent™ client software runs on both the source system(s) and the Genome Data Repository. The web service interface (WSI) and Tracker run only on the repository systems and mediate the file transfers. The first step is for an exchange of digitally signed certificates to take place.
Certificate Generation
[1218] At this point, the uploading source and the GDR have mutually authenticated by exchanging digitally signed certificates that can be traced to a trusted 3rd party, i.e., an Internet CA. The certificates are specific to this Gene Torrent Object file and the file it represents, is immune to a replay attack, and is not subject to man-in-the-middle interception.
SSL Session Negotiation
[1219] In order to provide enhanced security for the sensitive data on this network, the SSL connections will use the AES-128 cipher, which is a more robust (and FIPS- compliant) cipher than the RC4 cipher typically used.
Parallel Piece Transfers
[1220] The typical protocol file transfer takes place, with multiple actors on the Genome Data Repository side requesting pieces from the uploader at the Genome Sequence Centers (GSCs), until all pieces have been successfully received on the Repository shared file system.
Session Termination
[1221] The SSL session(s) are torn down and the one-time-use Gene Torrent Object file is allowed to expire. The encryption keys that are used to access the data are no longer functional for additional access sessions to this data. GeneTorrent™ SSL Implementation
[1222] SSL and the necessary certificate management is a novel and key advantage of GeneTorrent™ over public solutions.
[1223] FIGS. 20A-20B provide an illustration of a secure GeneTorrent™ download workflow between the client-side GeneTorrent™ data consumers and the server-side WSI/Data Manager at GDR, Tracker and GeneTorrent™ actors.
[1224] The network flow data that is available on the system can provide powerful statistical correlation data from comparative sequence data analysis. Consider a case where sequence variants data that is transmitted from various GSCs is monitored for quality assurance. Furthermore, the Tracker might be configured to track pieces of a .gto file to control duplication and distribution of this data.
GeneTorrent™ Peer Load Balancer
[1225] The proposed protocol will be able to scale to accommodate multiple server side GeneTorrent™ processes and download requests will be load balanced across processes to optimize server performance.
[1226] The Load Balancer module will talk to the WSI over a specified network interface to receive GTO files for each download session. It will then place the files in the appropriate GeneTorrent™ Peer work queues based on system load and quality of service.
[1227] Upon reaching a set threshold level of occurrence of a certain allele this information can be published back to the data consumers as well as all the producers to improve their methods. Notice that in the case of the unlinked sequence producers each of the GSC is responsible for reporting variant calls separately.
Monitoring and Statistics Reporting
[1228] The Genome Data Repository will maintain a database will full access logs (what files are uploaded, downloaded and modified by whom) and usage statistics (average transfer volume and rates, error rates, etc.). These will be managed by the Data Manager process using status from the GeneTorrent™ Tracker database. Users will access the data using standard database query and reporting tools and an administrative Web console may also be provided. System Software Components
[1229] In one embodiment there exist five discrete software subsystems that will interface through well-defined, network APIs. It should be appreciated that each subsystem can run on the same or different machines, and should use standard enterprise networking best practices.
• Search & Browse Tools (Test scripts for POC) : Users will use a 3rd party tool (e.g. DCC Data Portal), Web Browser and/or query scripts to search the metadata and find objects for download.
• GeneTorrent™ Client: Provides a CLI for secure, high-performance upload and download. Only download functionality will be integrated with the WSI for the POC; Basic file upload will be provided in GeneTorrent™ clients and server processes for POC testing purposes. The client runs on POSIX workstations with sufficient storage and performance and will be installed at customer sites (GSCs / GDACs).
• Repository Data Executive : The server Data Manager is run on the Repository application processor and is responsible for ensuring the integrity and security of the data and providing external interfaces for searching, uploading and downloading data. The Data Manager includes a SQL database with all of the sequence metadata, user information and system monitoring data. The POC will use MySQL database, but this may be replaced with PostgreSQL or an alternate DB in other releases.
External interfaces are implemented as RESTful Web Service Interfaces (WSI). In one embodiment the WSI uses Apache and a Solr search index.
• GeneTorrent™ Server Hub In one embodiment the GeneTorrent™ Server includes the Tracker and multiple Peer processes.
o Tracker : Orchestrates the connections and tracks status for transfers between GeneTorrent™ Actors. The Tracker is based on the standard well-established file distribution protocol.
° Xf S gtol : May be integrated within the Tracker. Clusters individual actors as participants belonging to a cast of actors in a particular affinity group that are all requesting file X. Determines an actor's cast by the file request, the location of the file (with which actor(s)) and the
particular actor's credentials to access the file. Determines the
authentication and entitlement of each actor based on authorization rules and using a secure key distribution scheme.
o GDR GeneTorrent™ Peer : Same software used for the Client GeneTorrent™ protocols. Server vs. client operation is controlled via command line options.
The Repository Data Executive and the GeneTorrent™ Server Hub may be collectively referred to herein as the "GT Executive" or the "GT Exec".
Software/System Architecture
[1230] FIG. 21 illustrates an exemplary software architecture of a system capable of providing GeneTorrent™ file transfer capability. FIG. 22 illustrates a corresponding exemplary system architecture.
Design Assumptions
[1231] Users will use a web browser or scripts to query the Repository's Web Services and find the desired objects for download. Users can request downloads for either all the objects within an analysis container or individual files. Because creation of the torrent files requires a non-trivial amount of time to calculate the pieces and checksums, the torrents will be stored on the GDR along with the data files. This will generally require a separate torrent for each data file.
[1232] Files will be stored on disk in a directory named with the analysis object UUID. This will avoid any potential name space collisions in the user's metadata archive and BAM filenames.
Client Command Line Interface
[1233] It should be appreciated that the command line syntax can change. However, an exemplary release of GeneTorrent™ contains a robust set of useful functionalities.
[1234] In one embodiment the network operating system for the GeneTorrent™ system functions in three (3) modes: upload, download, and seeder.
[1235] Upload mode is used to upload Gene Torrent Object files to a Genome Data Repository. Download mode that is represented in the SW suite is used to download files from the various GDRs on the network. Seeder mode is a mode used within each GDR to create GeneTorrent™ server instances that seed data to download actors on the bIQ.
[1236] General options (available to all modes): -b Bind IP address (default: All IPs on server)
—bindIP
No clean up. Prevents the application from
-noclean cleaning up after the transaction completes.
-v Verbose stdout progress reporting (default:
—verbose no output for successful processing)
-vv More Verbose stdout progress reporting
—moreVerbose (this is 2 v's, not a W)
Upload options:
-a <file name> REQUIRED: analysis.xml file name, may
—analysisFile include a path
-p <path> Full path to the data files in the analysis
—path file (default: current directory)
-s <int value> Piece size to use when building the gto file
—size (default: 1048576). If not specified, value
auto adjusts based on the size of the data file.
-t <url> REQUIRED: Tracker URL (this will be made a
—trackerURL default once the CGHub Tracker URL is identified)
Seeder options:
-c REQUIRED: Indicates CGHub seeder mode
—seeder -q <path> REQUIRED: Queue directory (file system
—queuePath path) to monitor for new .gto files to
seed
Download options:
-d < VARIABLE> REQUIRED: Indicates download mode, where
—download VARIABLE is a .gto file, a URI, or an XML
file containing a list ofURIs. Note that
this option may appear multiple times on
the command line.
-p <path> Path to save data files in the gto file(s)
—path (default: Current directory). UUID is part
of the gto and will always be added to
<path>, so data files will be found at
<path>/<UUID>.
-z <credential file> Full or relative file name of a file
—password containing the security token for this
download (default: -Z.gtUserPass)
Alternate Operational Control Modes
[1237] Although in one embodiment the GeneTorrent™ system may be controlled via a command-line in the manner discussed above, in other embodiments the GeneTorrent™ system may be indirectly controlled by a third party application and/or service. This form of interaction may be characterized as a form of "remote control" in that an entity external to the GeneTorrent™ system directs control of upload and download transfers. The external entity may reside on the same machine(s) as the GeneTorrent™ system components or it may reside in an entirely different network, operating in a command and control fashion from afar.
[1238] Additionally, in yet others embodiments of the GeneTorrent™ system may utilize automated batching techniques. In particular, in such embodiments the GeneTorrent™ system may be provided with a list of transfers to perform. This list of commands could be issued either all at once or sequentially by another sub-system and/or component without user interaction.
File Security - Layers Of Encryption
[1239] The GeneTorrent™ system will be capable of ingesting files of any format containing genome and transcriptome sequence data and any additional metadata files that are associated. These files are validated, encoded and encrypted in order to maximize transmission rate.
[1240] In one aspect the GeneTorrent™ method may be applied to transfer very large files of biological sequence data along with files containing other data and information having a very specific relationship. It is this information in these files that are encrypted and configured in layers associated with a layered data model.
[1241] For example, all of the data that is associated with a whole genome or whole exome sequence data could be encrypted within the same layer with one or more keys. This information may include, without limitation, annotation data concerning functional regions of the genome, genes, promoters, repeat sequences, DNA methylations, SNPs, CNVs, structural variants including chromosomal rearrangements.
[1242] A second layer of data would include gene expression data including data from splicing, RNA processing, mR A-Seq and miR A-Seq data. Another layer of encrypted data associated with the sequence files may include protein function assay results or protein level measurements. Other layers of encryption may include clinical test results and information on drug metabolism and response.
[1243] Yet still other layers of encrypted data might include metadata from various procedures from the extraction of the tissue or cell sample to the analyte preparation methods to the conditions of sequencing to the algorithms used for analysis of the sequence and any molecular pathways, drugs and specific disease associations.
[1244] For example, the information that is present in the various layers might be made accessible to based on the consent of the owner and also based on the relevance of the information to the user that is making the request.
[1245] Consider the case where the user of the data is a genome data analysis center (GDAC) making a request to use the whole genome sequence data to do an in silico screen for colorectal cancer. The owner of the data or an agent will receive a prompt for consent to use the data and user may then be authorized to access those regions of the genome with association to the specific disease based on layered encryption. [1246] The system is designed to track and coordinate all the data contained within these ancillary files. As a result, the various nodes on the network have awareness of the location of data as well as the compute clusters and algorithms that are available. In essence, the encrypted layered data is a component part of how the network provides the content awareness and biointelligence.
[1247] The operating system of the network is configured in such a manner that allows authorized users to be able to access the various layers of encryption with a consent- based conditional access system. For example, if a user is authorized to access the data then the network will know where this data resides and be able to operate on it.
Figure imgf000054_0001
Figure imgf000054_0002
Table 1 - Encryption layers
[1248] In one embodiment access rights to the data stored at the repository is controlled by the network operating system. This determination is made by the owner or custodian of the data by giving a one-time static consent or doing it dynamically with a different key per request. This is a novel approach to a highly distributed consent based access to personal health data which would follow and enforce the guidelines of applicable regulations and laws (e.g., HIPAA).
[1249] The biointelligence of the network may reside in the many different types of information and associated data that are relating specific to genome sequence data. In one embodiment all of the information associated with every file is searchable on a network- wide basis. As a consequence, a user with the proper authorization would be able to submit a query relating to any type of information from Table 1 and receive a response identifying all the genome sequence data files on the network that are accessible to the user based on the consent given by the respective owners of the data within the queried files. For example, a query can be made with reference to all of the genome and transcriptome data that has been uploaded to the network during a predetermined period (e.g., within the last 60 days).
[1250] In this case, the response to the query would come from multiple genome data local area networks (gLANs). The network OS would monitor the consent for access to data and user authorization and be able to effectively authenticate users.
Nextgen Data Repository
[1251] Referring to FIG. 23, in one embodiment the Nextegen Data Repository comprises high-speed fiber optic storage and computing infrastructure capable of facilitating the acquisition, secure storage, searching, and secure sharing of genome sequence data and phenotype metadata with authorized to access. In one embodiment the repository has the following attributes:
Provides secure transfer and storage of genome and phenotype information by authorized users
Supports multiple simultaneous high capacity transfers across multiple 10 gigabit/second links (and later possibly 40Gbps or lOOGbps)
The Data Repository may include the following:
• A cluster of storage controllers that provide
o Initially 500 Terabytes of genome data
o Scalable to 5 Petabytes of genome data
o Architected for 20 Petabytes of genome data
A cluster of application processors that provide
o High performance file transfer
o Security access control
o Fault protection
o Workflow monitoring
Transfer and Ingestion Software
[1252] Sequence Producing Centers are anticipated to be a primary source of sequence data. At such Centers, digital representations of biological samples are generated by processing such samples. Optionally, research centers may also upload genome data. In addition, phenotype information and high-level features derived from the raw sequence, the metadata, is produced at the DCC and other sources. Software and associated hardware will typically be located at these centers to perform the genome sequence transfer and ingestion processes. Such software will generally be capable of checking data format and validity prior to initiating uploading to the Data Repository. The software will also preferably perform transfer of genome and metadata information to Data Repository and support high capacity transfers at very high data rates (e.g., lOGigabits/second).
User Access Software
[1253] The user access software will be provided to the primary and secondary research center sites to enable downloading of information in the repository.
Controls access to Nextgen Data Repository base on consent based entitlement schema
Enables high capacity transfers up to 10 gigabits/second (depending on the capabilities of the equipment located in the research center)
Genome and Phenotype File Type, Sizes, and Organization
In one exemplary project, data is organized as follows:
• cancer type (lung, ovarian, etc), about 25 types
• batch (tumor/normal pairs are done in batches of about 100 cases, 5 batches per cancer type)
• case/sample ID within the batch (e.g. ID=TCGA-06-145)
The case/sample ID will have various extensions for the various types of files made for each case:
• tumor whole genome sequence file (250GB),
• tumor exome sequencing file (25GB),
• tumor RNA-seq file (< 120GB),
• tumor miRNA-Seq files
• tumor CNV files
• tumor methylation file (<1GB),
• blood normal whole genome file (250Gb),
• blood normal exome file (25Gb),
• blood normal RNA-seq file (< 120GB),
• blood normal miRNA-Seq files
• blood normal CNV files
• blood normal methylation file (<1GB),
• adjacenct normal whole genome file (250GB) and • adjacenct normal exome file (25 GB)
[1254] Specific details are given in the above description to provide a thorough understanding of the embodiments. However, it is understood that the embodiments may be practiced without these specific details. For example, circuits or other apparatus may be shown in block diagrams in order not to obscure the embodiments in unnecessary detail. In other instances, well-known circuits, processes, algorithms, structures, and techniques may be shown without unnecessary detail in order to avoid obscuring the embodiments.
[1255] Implementation of the techniques, blocks, steps and means described above may be done in various ways. For example, these techniques, blocks, steps and means may be implemented in hardware, software, or a combination thereof. For a hardware implementation, the processing units may be implemented within one or more application specific integrated circuits (ASICs), digital signal processors (DSPs), digital signal processing devices (DSPDs), programmable logic devices (PLDs), field programmable gate arrays (FPGAs), processors, controllers, micro-controllers, microprocessors, other electronic units designed to perform the functions described above, and/or a combination thereof.
[1256] Also, it is noted that the embodiments may be described as a process which is depicted as a flowchart, a flow diagram, a data flow diagram, a structure diagram, or a block diagram. Although a flowchart may describe the operations as a sequential process, many of the operations can be performed in parallel or concurrently. In addition, the order of the operations may be re-arranged. A process is terminated when its operations are completed, but could have additional steps not included in the figure. A process may correspond to a method, a function, a procedure, a subroutine, a subprogram, etc. When a process corresponds to a function, its termination corresponds to a return of the function to the calling function or the main function.
[1257] Furthermore, embodiments may be implemented by hardware, software, scripting languages, firmware, middleware, microcode, hardware description languages, and/or any combination thereof. When implemented in software, firmware, middleware, scripting language, and/or microcode, the program code or code segments to perform the necessary tasks may be stored in a machine readable medium such as a storage medium. A code segment or machine-executable instruction may represent a procedure, a function, a subprogram, a program, a routine, a subroutine, a module, a software package, a script, a class, or any combination of instructions, data structures, and/or program statements. A code segment may be coupled to another code segment or a hardware circuit by passing and/or receiving information, data, arguments, parameters, and/or memory contents. Information, arguments, parameters, data, etc. may be passed, forwarded, or transmitted via any suitable means including memory sharing, message passing, token passing, network transmission, etc.
[1258] For a firmware and/or software implementation, the methodologies may be implemented with modules (e.g., procedures, functions, and so on) that perform the functions described herein. Any machine-readable medium tangibly embodying instructions may be used in implementing the methodologies described herein. For example, software codes may be stored in a memory. Memory may be implemented within the processor or external to the processor. As used herein the term "memory" refers to any type of long term, short term, volatile, nonvolatile, or other storage medium and is not to be limited to any particular type of memory or number of memories, or type of media upon which memory is stored.
[1259] Moreover, as disclosed herein, the term "storage medium" may represent one or more memories for storing data, including read only memory (ROM), random access memory (RAM), magnetic RAM, core memory, magnetic disk storage mediums, optical storage mediums, flash memory devices and/or other machine readable mediums for storing information. The term "machine-readable medium" includes, but is not limited to portable or fixed storage devices, optical storage devices, wireless channels, and/or various other storage mediums capable of storing that contain or carry instruction(s) and/or data.
[1260] While the principles of the disclosure have been described above in connection with specific apparatuses and methods, it is to be clearly understood that this description is made only by way of example and not as limitation on the scope of the claims.

Claims

CLAIMS We claim:
1. A genome storage repository, comprising:
a data repository;
a receive interface for receiving, from over a network, a plurality of portions of at least one file of biological sequence data conveyed over the network in accordance with a parallel file transfer process; and
a controller in communication with the receive interface and the data repository, the controller generating a reconstructed file of biological sequence data by reconstructing the at least one file of biological sequence data using the plurality of portions of the at least one file of biological sequence data.
2. The genome storage repository of claim 1 wherein each of the plurality of portions of the at least one file of biological sequence data are encrypted using an encryption key specific to the parallel file transfer process, the controller using the encryption key to decrypt each of the plurality of portions of the at least one file of biological sequence data.
3. The genome storage repository of claim 1 wherein the controller is further configured to store the at least one file of biological sequence data in the data repository as a plurality of biological data units, each of the plurality of biological data units including a header and a payload including one or more instructions representative of biological sequence information encoded relative to a reference sequence.
4. The genome storage repository of claim 3 wherein the header of each biological data unit includes biological information relevant to the biological sequence data represented by the payload of the biological data unit.
5. The genome storage repository of claim 4 wherein the header of a first of the plurality of biological data units includes DNA-related information and the header of a second of the plurality of biological data units includes RNA-related information.
6. The genome storage data repository of claim 3 wherein the controller is configured to retrieve ones of the plurality of biological data units from the data repository and provide the ones of the plurality of biological data units to a transmit interface for transmission to a subscriber device.
7. The genome storage data repository of claim 6 wherein the transmit interface is operative to transmit the ones of the plurality of biological data units pursuant to a parallel file transfer process.
8. The genome storage data repository of claim 6 wherein the controller is further configured to encrypt the ones of the ones of the plurality of biological data units using a subscriber key unique to the subscriber device.
9. The genome storage data repository of claim 8 wherein the controller is further configured to encrypt the ones of the ones of the plurality of biological data units using a transfer key unique to a transfer session associated with the parallel file transfer process.
10. A subscriber node operable within a biological data network, the subscriber node comprising:
a receive interface for receiving, over one or more data links of the biological data network, a plurality of biological data units containing encoded genomic information wherein the encoded genomic information represents genomic information encoded relative to a reference sequence; and
a controller for processing the plurality of biological data units.
11. The subscriber node of claim 11 further including a memory unit, the controller storing the biological data units within the memory unit.
12. The subscriber node of claim 10 wherein the encoded genomic information is encoded using a plurality of instructions defined relative to the reference sequence.
13. The subscriber node of claim 10 wherein a first of the plurality of biological data units includes a payload containing a portion of the encoded genomic information and at least one header associated with biological information relating to the portion of the encoded genomic information.
14. The subscriber node of claim 10 wherein each of the plurality of biological data units is encrypted, the controller further being configured to decrypt each of the plurality of biological data units using a subscriber key unique to the subscriber node.
15. The subscriber node of claim 10 wherein each of the plurality of biological data units is encrypted, the controller further being configured to decrypt each of the plurality of biological data units using a transfer key unique to a data transfer session.
16. The subscriber node of claim 15 wherein the data transfer session is associated with a parallel file transfer process.
17. A genome storage repository, comprising:
a data repository containing encoded genomic information and biological information relating to the encoded genomic information;
a controller for generating a plurality of data units containing the encoded genomic information and the biological information; and
a transmit interface for transferring the plurality of data units to a subscriber device over a network.
18. The genome storage repository of claim 17 wherein the encoded genomic information represents genomic information encoded relative to a reference sequence.
19. The genome storage repository of claim 17 wherein one of the plurality of data units includes a payload containing the encoded genomic information and a plurality of headers containing the biological information.
20. The genome storage repository of claim 17 wherein the transmit interface is operative to transmit the plurality of data units pursuant to a parallel file transfer process.
21. The genome storage repository of claim 20 wherein the controller is further configured to encrypt the plurality of data units using a subscriber key unique to the subscriber device.
22. The genome storage repository of claim 21 wherein the controller is further configured to encrypt the plurality of data units using a transfer key unique to a transfer session associated with the parallel file transfer process.
23. A node operable within a biological data network, the node comprising:
a receive interface for receiving a plurality of data units from one or more data links of the biological data network wherein each of the plurality of data units includes a payload representative of encoded genomic information and a header representative of biological information relating to the encoded genomic information;
a data repository; and
a controller for storing the plurality of data units within the data repository.
24. The node of claim 23 wherein the encoded genomic information represents genomic information encoded relative to a reference sequence using a plurality of instructions included within an instruction set.
25. The node of claim 23 wherein at least one of the plurality of data units includes a payload containing the encoded genomic information and a first header associated with biological information relating to the encoded genomic information.
26. The node of claim 23 wherein the at least one of the plurality of data units further includes a second header associated with clinical information relating to the encoded genomic information.
27. The node of claim 23 wherein the at least one of the plurality of data units further includes a second header associated with pharmacological information relating to the encoded genomic information.
28. The node of claim 23 wherein the at least one of the plurality of data units further includes a second header associated with chemical information relating to the encoded genomic information.
29. The node of claim 23 wherein the at least one of the plurality of data units further includes a second header associated with physical information relating to the encoded genomic information.
30. The node of claim 23 wherein the controller is further configured for processing ones of the plurality of data units in accordance with an analysis program and for storing results of the processing within the data repository in association with at least certain of the ones of the plurality of data units.
31. The node of claim 23 wherein the controller is further configured to receive the analysis program from another node within the biological data network.
32. The node of claim 31 further including a transmit interface configured to send the results of the processing to the another node.
33. A subscriber node, comprising:
a receive interface for receiving, from over a network, an encrypted data unit containing encoded genomic information wherein the encoded genomic information represents genomic information encoded relative to a reference sequence using a plurality of instructions; and
a controller for decrypting the encrypted data unit using a subscriber key.
34. The subscriber node of claim 33 wherein the encrypted data unit is received pursuant to a parallel data transfer process and further encrypted using a session key associated with the parallel data transfer process.
35. The subscriber node of claim 33 wherein the encrypted data unit includes a payload representative of the encoded genomic information and a header representative of biological information relating to the encoded genomic information.
36. A method, comprising:
receiving, from over a network, a plurality of portions of at least one file of biological sequence data conveyed over the network in accordance with a parallel file transfer process wherein ones of the plurality of portions are transferred substantially simultaneously in multiple data streams;
generating a reconstructed file of biological sequence data by reconstructing the at least one file of biological sequence data using the plurality of portions of the at least one file of biological sequence data; and
storing the at least one file of biological sequence data in a data repository.
37. The method of claim 36 wherein each of the plurality of portions of the at least one file of biological sequence data are encrypted using an encryption key specific to the parallel file transfer process, the method further including using the encryption key to decrypt each of the plurality of portions of the at least one file of biological sequence data.
38. The method of claim 36 wherein the storing further includes storing the at least one file of biological sequence data in the data repository as a plurality of biological data units, each of the plurality of biological data units including a header and a payload including one or more instructions representative of biological sequence information encoded relative to a reference sequence.
39. The method of claim 38 wherein the header of each biological data unit includes biological information relevant to the biological sequence data represented by the payload of the biological data unit.
40. The method of claim 39 wherein the header of a first of the plurality of biological data units includes DNA-related information and the header of a second of the plurality of biological data units includes RNA-related information.
41. The method of claim 38 further including retrieving ones of the plurality of biological data units from the data repository and transmitting the ones of the plurality of biological data units to a subscriber device.
42. The method of claim 41 wherein the transmitting is performed pursuant to a parallel file transfer process involving a plurality of parallel data streams.
43. The method of claim 41 further including encrypting the ones of the ones of the plurality of biological data units using a subscriber key unique to the subscriber device.
44. The method of claim 43 further including encrypting the ones of the ones of the plurality of biological data units using a transfer key unique to a transfer session associated with the parallel file transfer process.
45. A method, comprising:
receiving, over one or more data links of a biological data network, a plurality of biological data units containing encoded genomic information wherein the encoded genomic information represents genomic information encoded relative to a reference sequence; and processing the plurality of biological data units; and
storing the plurality of biological data units within a memory unit.
46. The method of claim 45 wherein each of the plurality of biological data units includes a payload representative of a portion of the genomic information and a header representative of biological information pertaining to the portion of the genomic information.
47. The method of claim 45 wherein the encoded genomic information is encoded using a plurality of instructions defined relative to the reference sequence.
48. The method of claim 45 wherein a first of the plurality of biological data units includes a payload containing a portion of the encoded genomic information and at least one header associated with biological information relating to the portion of the encoded genomic information.
49. The method of claim 45 wherein each of the plurality of biological data units is encrypted, the method further including decrypting each of the plurality of biological data units using a subscriber key unique to the subscriber node.
50. The method of claim 45 wherein each of the plurality of biological data units is encrypted, the method further including decrypting each of the plurality of biological data units using a transfer key unique to a data transfer session.
51. The method of claim 50 wherein the data transfer session is associated with a parallel file transfer process.
52. A method, comprising:
establishing a data repository containing encoded genomic information and biological information relating to the encoded genomic information;
generating a plurality of data units containing the encoded genomic information and the biological information; and
transferring the plurality of data units to a subscriber device over a network.
53. The method of claim 52 wherein the encoded genomic information represents genomic information encoded relative to a reference sequence.
54. The method of claim 52 wherein one of the plurality of data units includes a payload containing the encoded genomic information and a plurality of headers containing the biological information.
55. The method of claim 52 wherein the transferring includes transmitting the plurality of data units pursuant to a parallel file transfer process.
56. The method of claim 55 further including encrypting the plurality of data units using a subscriber key unique to the subscriber device.
57. The method of claim 56 further including encrypting the plurality of data units using a transfer key unique to a transfer session associated with the parallel file transfer process.
58. A method, comprising:
receiving a plurality of data units from one or more data links of a biological data network wherein each of the plurality of data units includes a payload representative of encoded genomic information and a header representative of biological information relating to the encoded genomic information; and
storing the plurality of data units within a data repository.
59. The method of claim 58 wherein the encoded genomic information represents genomic information encoded relative to a reference sequence using a plurality of instructions included within an instruction set.
60. The method of claim 58 wherein at least one of the plurality of data units includes a payload containing the encoded genomic information and a first header associated with biological information relating to the encoded genomic information.
61. The method of claim 58 wherein the at least one of the plurality of data units further includes a second header associated with clinical information relating to the encoded genomic information.
62. The method of claim 58 wherein the at least one of the plurality of data units further includes a second header associated with pharmacological information relating to the encoded genomic information.
63. The method of claim 58 wherein the at least one of the plurality of data units further includes a second header associated with chemical information relating to the encoded genomic information.
64. The method of claim 58 wherein the at least one of the plurality of data units further includes a second header associated with physical information relating to the encoded genomic information.
65. The method of claim 58 further including processing ones of the plurality of data units in accordance with an analysis program and storing results of the processing within the data repository in association with at least certain of the ones of the plurality of data units.
66. The method of claim 58 further including receiving the analysis program from a node within the biological data network.
67. The method of claim 66 further including sending the results of the processing to the node.
68. A method, comprising:
receiving, from over a network, an encrypted data unit containing encoded genomic information wherein the encoded genomic information represents genomic information encoded relative to a reference sequence using a plurality of instructions;
decrypting the encrypted data unit using a subscriber key so as to generate a decrypted data unit; and
storing the decrypted data unit within a memory.
69. The method of claim 68 wherein the receiving further includes receiving the encrypted data unit pursuant to a parallel data transfer process and wherein the encrypted data unit has been further encrypted using a session key associated with the parallel data transfer process.
70. The method of claim 68 wherein the encrypted data unit includes a payload representative of the encoded genomic information and a header representative of biological information relating to the encoded genomic information.
71. The genome storage repository of claim 1 wherein the receive interface is further configured to receive, from an analysis center, a request to process the at least one file of biological sequence data in accordance with an analysis program and wherein the controller is configured to execute instructions of the analysis program so as to generate analysis results for sending to the analysis center.
72. The genome storage repository of claim 71 wherein the receive interface is further configure to receive the analysis program from the analysis center.
73. The genome storage repository of claim 17 further including a receive interface configured to receive, from an analysis center, a request to process the encoded genomic information in accordance with an analysis program and wherein the controller is configured to execute instructions of the analysis program so as to generate analysis results for sending to the analysis center via the transmit interface.
74. The genome storage repository of claim 73 wherein the receive interface is further configure to receive the analysis program from the analysis center.
75. The node of claim 23 wherein the receive interface is further configured to receive, from an analysis center, a request to process the plurality of data units in accordance with an analysis program and wherein the controller is configured to execute instructions of the analysis program so as to generate analysis results for sending to the analysis center.
76. The node of claim 75 wherein the receive interface is further configure to receive the analysis program from the analysis center.
77. A genome storage repository, comprising:
a data repository containing encoded genomic information and biological information relating to the encoded genomic information;
a receive interface for receiving, from over a network, a processing request from an analysis node; and
a controller operative to process, in response to the processing request, at least the genomic information in accordance with an analysis program in order to generate analysis results.
78. The genome storage repository of claim 77 further including a transmit interface configured to transmit the analysis results over the network to the analysis node.
79. The genome storage repository of claim 77 wherein the receive interface is further configured to receive the analysis program from the analysis node.
80. A method, comprising:
establishing a data repository containing encoded genomic information and biological information relating to the encoded genomic information;
receiving, from over a network, a processing request from an analysis node; and processing, in response to the processing request, at least the genomic information in accordance with an analysis program in order to generate analysis results.
81. The method of claim 80 further including transmitting the analysis results over the network to the analysis node.
82. The method of claim 80 further including receiving the analysis program from the analysis node.
PCT/US2012/057668 2011-09-27 2012-09-27 System and method for facilitating network-based transactions involving sequence data WO2013049420A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
EP12835985.8A EP2761518A4 (en) 2011-09-27 2012-09-27 System and method for facilitating network-based transactions involving sequence data

Applications Claiming Priority (10)

Application Number Priority Date Filing Date Title
US201161539942P 2011-09-27 2011-09-27
US201161539931P 2011-09-27 2011-09-27
US61/539,931 2011-09-27
US61/539,942 2011-09-27
US13/417,184 2012-03-09
US13/417,184 US20120233201A1 (en) 2011-03-09 2012-03-09 Biological data networks and methods therefor
US201261650417P 2012-05-22 2012-05-22
US61/650,417 2012-05-22
US201261662996P 2012-06-22 2012-06-22
US61/662,996 2012-06-22

Publications (1)

Publication Number Publication Date
WO2013049420A1 true WO2013049420A1 (en) 2013-04-04

Family

ID=47996410

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2012/057668 WO2013049420A1 (en) 2011-09-27 2012-09-27 System and method for facilitating network-based transactions involving sequence data

Country Status (2)

Country Link
EP (1) EP2761518A4 (en)
WO (1) WO2013049420A1 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2816496A1 (en) * 2013-06-19 2014-12-24 Sophia Genetics S.A. Method to manage raw genomic data in a privacy preserving manner in a biobank
WO2016036969A1 (en) * 2014-09-03 2016-03-10 Nantomics, Llc Synthetic genomic variant-based secure transaction devices, systems and methods
EP3274890A4 (en) * 2015-03-23 2019-03-13 Private Access Inc. System, method and apparatus to enhance privacy and enable broad sharing of bioinformatic data
US10957420B2 (en) 2014-11-25 2021-03-23 Koninklijke Philips N.V. Secure transmission of genomic data
WO2022056293A1 (en) * 2020-09-14 2022-03-17 Illumina Software, Inc. Custom data files for personalized medicine

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1997022076A1 (en) * 1995-12-12 1997-06-19 Visible Genetics Inc. Virtual dna sequencer
US20020029113A1 (en) * 2000-08-22 2002-03-07 Yixin Wang Method and system for predicting splice variant from DNA chip expression data
WO2004015579A1 (en) * 2002-07-31 2004-02-19 Trek 2000 International Ltd. Method and apparatus of storage anti-piracy key encryption (sake) device to control data access for networks
WO2006084391A1 (en) * 2005-02-11 2006-08-17 Smartgene Gmbh Computer-implemented method and computer-based system for validating dna sequencing data

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1997022076A1 (en) * 1995-12-12 1997-06-19 Visible Genetics Inc. Virtual dna sequencer
US20020029113A1 (en) * 2000-08-22 2002-03-07 Yixin Wang Method and system for predicting splice variant from DNA chip expression data
WO2004015579A1 (en) * 2002-07-31 2004-02-19 Trek 2000 International Ltd. Method and apparatus of storage anti-piracy key encryption (sake) device to control data access for networks
WO2006084391A1 (en) * 2005-02-11 2006-08-17 Smartgene Gmbh Computer-implemented method and computer-based system for validating dna sequencing data

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP2761518A4 *

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10402588B2 (en) 2013-06-19 2019-09-03 Sophia Genetics S.A. Method to manage raw genomic data in a privacy preserving manner in a biobank
WO2014202615A3 (en) * 2013-06-19 2015-02-19 Sophia Genetics S.A. Method to manage raw genomic data in a privacy preserving manner in a biobank
EP2816496A1 (en) * 2013-06-19 2014-12-24 Sophia Genetics S.A. Method to manage raw genomic data in a privacy preserving manner in a biobank
US10013575B2 (en) 2013-06-19 2018-07-03 Sophia Genetics S.A. Method to manage raw genomic data in a privacy preserving manner in a biobank
US10050959B2 (en) 2014-09-03 2018-08-14 Nanthealth, Inc. Synthetic genomic variant-based secure transaction devices, systems and methods
WO2016036969A1 (en) * 2014-09-03 2016-03-10 Nantomics, Llc Synthetic genomic variant-based secure transaction devices, systems and methods
US11785004B2 (en) 2014-09-03 2023-10-10 Nanthealth, Inc. Synthetic genomic variant-based secure transaction devices, systems and methods
US11785002B2 (en) 2014-09-03 2023-10-10 Nanthealth, Inc. Synthetic genomic variant-based secure transaction devices, systems and methods
US12052240B2 (en) 2014-09-03 2024-07-30 Nanthealth, Inc. Synthetic genomic variant-based secure transaction devices, systems and methods
RU2753245C2 (en) * 2014-11-25 2021-08-12 Конинклейке Филипс Н.В. Secure genomic data transmission
US10957420B2 (en) 2014-11-25 2021-03-23 Koninklijke Philips N.V. Secure transmission of genomic data
EP3274890A4 (en) * 2015-03-23 2019-03-13 Private Access Inc. System, method and apparatus to enhance privacy and enable broad sharing of bioinformatic data
US10796782B2 (en) 2015-03-23 2020-10-06 Private Access, Inc. System, method and apparatus to enhance privacy and enable broad sharing of bioinformatic data
WO2022056293A1 (en) * 2020-09-14 2022-03-17 Illumina Software, Inc. Custom data files for personalized medicine

Also Published As

Publication number Publication date
EP2761518A4 (en) 2016-01-27
EP2761518A1 (en) 2014-08-06

Similar Documents

Publication Publication Date Title
US20130246460A1 (en) System and method for facilitating network-based transactions involving sequence data
AU2013277986B2 (en) System and method for secure, high-speed transfer of very large files
US10560272B2 (en) Bio-information data providing method, bio-information data storing method and bio-information data transferring system based on multiple blockchains
Simonyan et al. High-performance integrated virtual environment (HIVE): a robust infrastructure for next-generation sequence data analysis
US20200176094A1 (en) Cloud-like medical-information service
Xin et al. High-performance web services for querying gene and variant annotation
US7653634B2 (en) System for the processing of information between remotely located healthcare entities
US8982879B2 (en) Biological data networks and methods therefor
Leekitcharoenphon et al. snpTree-a web-server to identify and construct SNP trees from whole genome sequence data
Seth et al. Securing bioinformatics cloud for big data: Budding buzzword or a glance of the future
EP2761518A1 (en) System and method for facilitating network-based transactions involving sequence data
US8266706B2 (en) Cryptographically controlling access to documents
Zolfaghari et al. Cryptography in hierarchical coded caching: System model and cost analysis
US20180322246A1 (en) System and method for secure, high-speed transfer of very large files
Parker et al. Building infrastructure for African human genomic data management
Boujdad et al. On distributed collaboration for biomedical analyses
Corvò et al. Remote visualization of large-scale genomic alignments for collaborative clinical research and diagnosis of rare diseases
Kim et al. SVAT: Secure outsourcing of variant annotation and genotype aggregation
WO2020019039A1 (en) A method for secure handling of gene sequences
Johansson et al. An interconnected data infrastructure to support large-scale rare disease research
Jain et al. GenoVault: a cloud based genomics repository
Tharayil et al. Service-oriented laboratory information management system for life sciences research
Kottha et al. Accessing bio-databases with OGSA-DAI-a performance analysis
US20130254547A1 (en) Encrypted transmission to and storage of surprisal data
Xu et al. SNPTrack TM: an integrated bioinformatics system for genetic association studies

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 12835985

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

REEP Request for entry into the european phase

Ref document number: 2012835985

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 2012835985

Country of ref document: EP