본문바로가기

Platform Technology

Aptamer Sciences is making efforts to build the integrated platform for aptamer
discovery as well as the development of innovative products for application.

Aptamer Technology

Aptamer

Single-stranded oligonucleotides that specifically
bind to targets in three-dimensional structures
Aptamers are single-stranded oligonucleotide (DNA, RNA) that specifically bind to target molecules (e.g. proteins, small molecules) like antibodies, and they are extensively used for the development of research tools, diagnosis and therapeutics.
In particular, antibody-drug conjugate (ADC)-based technology has difficulty in controlling the conjugation of drugs to antibodies and penetrating into cancer tissues due to the size of the conjugates. Aptamers are garnering much attention as an alternative to satisfying the unmet needs of antibodies, showing steady demands in various application areas.
  • A broad range of target

    (protein, small molecule, etc.)

  • Excellent binding affinity

    (high specificity)

  • Safe materials

    (low toxicity)

  • Easily mass-produced

    (low price)

Securing growth momentum

Natural nucleoside-based aptamers in early days had limitations in commercialization due to the lack of diversity and biostability. However, since the aptamers with significantly improved druggability using modified nucleosides were introduced, the technological foundation for commercialization has been laid. In addition, there has been a growing number of research articles on aptamer technology since the original patent expired, providing sufficient momentum for the development of commercial purposes.

  • SELEX was firstly developed by Professor Larry Gold from the University of Colorado in 1990.
  • Aptamers has been in the limelight since Macugen was successfully launched as the first aptamer drug in 2005.
  • Many succeeding products initiated their clinical trial stage, but Macugen lost its competitiveness in the market and the succeeding pipelines such as Fovista ended in failure at the clinical stage.
  • Momentum for commercialization is secured through the expiration of the original technology patent and the development of new modified nucleic acid technology

Our Technology Platform

Aptamer Sciences has made our efforts to develop technologies which effectively discover high quality aptamers, technologies which optimize the discovered aptamers to serve the purpose of application, and to build the technology platform with a distinctive aptamer archive.

Aptamer Discovery Technology

SELEX is a combinatorial technique for discovering aptamers which bind to target molecules with high affinity and specificity; briefly, combining target molecules with nucleic acid libraries with diversity, removing unbound nucleic acids, and collecting the remaining nucleic acids which bind to targets.

PCR amplification and repeating above process make it possible to enrich the only nucleic acids with high affinity to target molecules. The final aptamer clones are selected by sequencing and analyzing their affinity to a target. Since SELEX was firstly developed by Professor Larry Gold at the University of Colorado in 1990, a number of aptamers against a variety of target molecules have been discovered.

Next-generation Aptamer Discovery Technology with established independent Aptamer Platform Technology which are suitable for developing application.
01
SELEX

Technology to discover high quality aptamers from a DNA library with improved binding affinity for target molecules by increasing the diversity and hydrophobicity of the library. (Binding affinity ≤ 20 nM, Binding time > 30 minutes)

02
ViroSELEX

Technology to improve the applicability of aptamers by displaying targets on the virus surface, mimicking the original environment. Technology to specialize in discovering high-target specific aptamers for membrane proteins that are available for therapeutic targets.

03
NGS analysis

A sequencing-based aptamer selection technique analyzing sequence patterns and structural similarities, and technology to increase possibility to obtain various clones.

Aptamer Optimization Technology

Selected aptamers will go through the optimization process to increase their utility for application. This technology is essential in terms of developing therapeutics and early-stage diagnostic products. Aptamer Sciences is striving to optimize aptamers to have their best structures and efficacy by allowing them to go through “truncation,” “lead optimization,” “ligand scan,” and “aptamer pair discovery”.

  • Truncation
  • Lead optimization
  • Ligand scan
  • Aptamer pair discovery

Aptamer Archive

Aptamer Sciences has an archive of selective and high-affinity aptamers for more than 250 membrane receptor proteins which are valid for therapeutic targets. Drug candidates for the development of innovative aptamer-based therapeutics are identified and selected through the optimization process.

If you are interested in the aptamer archive, please click below to contact us.

Download Aptamer Archive

* Name
* Last name
* company/ organization
* Country
* Tel
* Email
Contents

Privacy policy

In order to protect the user’s personal information and rights in accordance with the Personal Information Protection Act and to address user complaints related to personal information, Aptamer sciences(hereunder “company”) applies the policy it established as described below.
“company” notifies updates of the Privacy Policy, if any, through the noticeboard of its website (or personal notification).


ο This policy is effective as of January 1, 2021.


1. Purpose of Personal Information Processing “company”utilizes the personal information collected for the purposes described below. Personal information that is handled is not used for purposes other than those stated below. If there is any change to the purpose of use, prior consent will be sought.
A. Website membership management
Identification• authentication for service provision, membership maintenance, identification in accordance with the limited verification of identity system, and prevention of illegal use of service.


B. Handling of civil applications
Personal information may be used for the purpose of identifying applicants, checking application details, contacting for fact checking, and notifying the results.
C. Provision of materials or services
Personal information may be used for service provision purposes.
D. Use for marketing and advertisement
Personal information may be used for the purpose of checking of validity of services, grasping of access frequency, and statistical reference of members’ service use.
2. Present status of personal information files
• 1. Personal information file name: Personal information
• Personal information items: E-mail, mobile phone no., company telephone no., title, department, company name, access log, access IP info., and legal representative’s name
• How to collect info.: Website
• Reason for retention: Agreement to personal information use
• Retention period: 3
• Related laws: Records regarding the collection, processing, and use of credit information: 3 years, Records of consumer complaints or dispute settlements: 3 years, Records of contracts or application withdrawal: 5


3. Period of personal information processing and retention① “company” processes and retains personal information during the designated period of use as agreed upon with the information object and according to laws concerning the retention and use period of personal information.
② The period of personal information processing and retention depending on the service type is as follows:
• 1.<Civic service>
• Personal information related to <civic service provision> is retained and used for the aforesaid purposes for 3 years from the date of agreement to the collection and use of personal information.
• Reason for retention: Agreement to personal information use
• Related laws: 1) Records of consumer complaints or dispute settlements: 3 years, 2) Records of contracts or application withdrawal: 5
• Reason for exception:


4. Provision of personal information to a third party① “company” may provide a third party with personal information only when the personal information object agrees to it and such is in accordance with specific laws or regulations such as Articles 17 and 18 of the Personal Information Protection Act.
② “company” may provide personal information to a third party in the following cases:
• 1. “company”
• Those who are provided with personal information: “company”
• Purpose of the receiver’s use of personal information: E-mail, mobile phone no., company telephone no., title, department, company name, and legal representative’s name
• Purpose of the receiver’s retention and use of personal information: 3


5. Rights and duties of the information object and legal representative as well as how to exercise the rights As a personal information object, a user may exercise the following rights:
① An information object may exercise the right to request “company” for opening, correction, deletion, and suspension of use of personal information anytime.
② The act of exercising the rights stated in Paragraph 1 above may be implemented in writing or via e-mail or fax in accordance with Article 41-1 of the Enforcement Ordinance of the Personal Information Protection Act. In response, “company” will take measures accordingly without delay.
③ An information object may exercise the rights stated in Paragraph 1 above through a legal representative or an entrusted individual. In this case, the user shall submit a letter of attorney using Annex Form No. 11 of the Enforcement Regulations of the Personal Information Protection Act.
④ The information object’s right to request opening or suspension of use of personal information may be restricted in accordance with Articles 35-5 and 37-2 of the Personal Information Protection Act.
⑤ As for the correction and deletion of certain personal information items, in case the relevant law specifies such items as a basic requirement, the request for deletion may not be accepted.
⑥ As for the correction and deletion of certain personal information items, in case the relevant law specifies such items as a basic requirement, the request for deletion may not be accepted.


6. Personal information items to be handled① “company” handles the following personal information items:
• 1<Civic service>
• Required items: E-mail, mobile phone no., company telephone no., title, department, company name, and legal representative’s name and mobile phone no.
• - Optional items:


7. Disposal of Personal Information Once the purpose of handling personal information is fulfilled, “company” destroys the personal information without delay, in principle. Personal information is deleted using the following procedure and method:
-Deletion Procedures
Information that is entered by a user is transferred to a separate database once its purpose is fulfilled (in the case of paper, a separate filing cabinet), and then destroyed after the designated period in accordance with internal directions or related laws on privacy protection. Personal information transferred to a DB is not used for any other purpose unless required by law.-Information DisposalA user’s personal information is destroyed within 5 days of the final date of retention if the retention period expires and within 5 days of the date when the handling of personal information is judged as unnecessary for reasons such as fulfillment of handling personal information, termination of service, completion of business, etc.
-Disposal Method
Personal information saved in electronic file format is deleted by means of a technical method that makes opening the file impossible.


8. Installation, operation, and denial of devices automatically collecting personal information
“company” does not use “cookies” that save and frequently load an information object’s use logs.


9. Person in charge of protecting personal information
① In order to manage duties regarding personal information as well as handle complaints and remedies, “company” designates the following person in charge of protecting personal information:
• ▶ Person in charge of protecting personal information
• Name: 
• Title: 
• Position: 
• Contact Info.: 
② An information object may inquire with the personal information protection manager and responsible department about personal information protection, unsatisfactory service, remedies for damage, etc. regarding the service (business) offered by “company” “company” will provide an answer to such inquiries without delay.


10. Change to privacy policy
①The present privacy policy comes into effect on the enforcement date. When there is any addition, deletion, or correction of a provision according to related laws or regulations, such shall be notified at least 7 days before its application.


11. Measures for personal information security According to Article 29 of the Personal Information Protection Act, “company” takes technical, managerial, and physical measures for information security as follows:
1. “company” designates the minimal number of employees in charge of handling personal information so that personal information is handled only by the designated individual(s) in charge.2. Technical measures for hacking, etc.
In order to prevent personal information leak or damage due to hacking, computer viruses, etc., “company” installs and regularly updates and checks security programs. “company” installs a security system in a restricted area and supervises it technically and physically.
3. Personal information encryption
A user’s password is encrypted when stored and managed and is known to the user only. For files including vital data, additional security functions such as encryption and file locking are applied.


4. Retention of access logs and forgery prevention
Logs of access to the personal information processing system are kept and managed for at least 6 months. Security functions are applied to prevent log forgery, leak, or loss.


5. Control of unauthorized individuals’ access
Personal information is kept in a physically separate place, and access control procedures are established and operated.