top of page

Veritrue

Securely authenticating your assets with NFT technology.
Frame 42.png
An app for making authenticating your Luxury products using NFT's. 
About the product

In today's product landscape, the counterfeit goods market is estimated to exceed 3 trillion dollars. This vast market attracts numerous scammers who profit from selling fake products that are notoriously difficult to authenticate. Therefore, This solution focuses on creating a digital solution leveraging blockchain technology to assist individuals in authenticating their products effectively.

Overview

As an interaction design student at Pearl Academy, I had the chance to work on several projects. However, I am excited to share my experience working on this blockchain based product, which was a significant journey for me. In this case study, I will provide an in-depth exploration of the design process, unraveling the reasons and methods behind each step of transforming the usage of NFTs.

Features & Flows
Using AI to authenticate 

Joshua is trying to verify the authenticity of a bag he plans to purchase. He is using the AI verification feature in the Veritrue app to make an informed decision.

Adding metadata to the NFT for storage. 

When Joshua buys his bag, he can have it verified at one of our authorized verification centers. He can then add the certificate and other supporting images to the metadata, ensuring they are safe and secure.

History of ownership.

When Joshua buys a bag, he can access the list of all previous owners by tracking the transfers recorded in the NFT, allowing him to make an informed decision.

Integration with other payment apps

Integration with other payment apps will enable users to make seamless payments and facilitate smooth NFT transfers.

Project Goals

After talking to a few of the fashion design teachers, I realized that buying luxury products is a major hassle and getting them authenticated is a significant concern. So, I decided to embark on a journey to understand the hardships and design a solution using the latest technology to provide the best possible solutions.

MacBook Air - 1.png
Research Secondary Source
MacBook Air - 4.png

The following graph shows the value of counterfeit goods confiscated by US customs in 2020, categorized by type of goods.

*Total value estimated based on suggested retail price of seized goods.

Competitive Analysis

To gain insights into existing market solutions and understand the pain points experienced by users, I conducted a competitive analysis.

Physical Inspection by Experts

Certification by Manufacturer or Authorized Dealers

Pros:

  • Trained professionals can identify even the smallest discrepancies.

  • Allows for a thorough examination of all aspects of the watch.

Pros:

  • Provides assurance of authenticity and verified provenance.

  • Often comes with a warranty from the manufacturer.

Cons:

  • Requires an appointment and can take time.

  • May be expensive depending on the expert or service used.

Cons:

  • Counterfeiters are increasingly sophisticated and may replicate official documents.

  • Documents are easily counterfeited and tampered with.

  • Not all luxury Products come with official certification.

Online Authentication Services

Certification by Manufacturer or Authorized Dealers

Pros:

  • Authentication can be done from the comfort of your home.

  • Some services offer same-day authentication.

Pros:

  • Authentication can be completed quickly, often within minutes.

  • AI systems can process a large number of authentication requests simultaneously.

Cons:

  • Authentication may not be as accurate as physical inspection.

  • Fees may vary depending on the service.

Cons:

  • Relies on the quality of data used for training the AI model.

  • Cannot verify internal components of the watch.

User Interviews Primary Research
Frame 143.png

Reseller of luxury Products

Image by Marwan Abdalah

09 user interviews with luxury market consumers

User Stories

Define

MacBook Air - 4 (1).png

We create user stories to comprehend the needs and desires of our users, which guides our product development and ensures their expectations are met.

User Stories
Key Insights 
Frame 31.png

1

Struggling to securely store and protect all essential product-related documents.

Frame 31.png

4

Authenticating their product proves to be both lengthy and expensive, creating a significant barrier for users seeking assurance and trust in their purchases.

Frame 31.png

2

Users encounter difficulties authenticating their high-value products both before and after purchase

Frame 31.png

5

Frame 31.png

3

Users lack visibility into their product's service or purchase history, leading to a frustrating user experience.

Users are highly susceptible to misinformation and scams when buying from unreliable sellers, leading to a lack of trust and a negative user experience.

Persona

Define

Persona

To gain insights into existing market solutions and understand the pain points experienced by users, I conducted a competitive analysis.

Rectangle 175.png

Buyers Persona

UX Persona (2).png

Generate Ideas

Ideate

Ideating

We brainstorm to develop innovative ideas and solutions that foster creativity and problem-solving. The goal is to create an environment where original thinking thrives, leading to effective and imaginative outcomes.

Frame 31.png

1

Simplified Authentication process

Struggling to securely store and protect all essential product-related documents.

Frame 31.png

3

Secure and Tamper-Proof Certification

Struggling to securely store and protect all essential product-related documents.

Frame 31.png

2

Data storing platform

Struggling to securely store and protect all essential product-related documents.

Frame 31.png

4

Empowering Users with Clear Information

Struggling to securely store and protect all essential product-related documents.

User flow

Design

User flow

We utilize user flows to visualize the journey our users take through our product. This helps us understand their path and optimize their experience. This particular user flow outlines how users can use the AI scan feature to authenticate their product.

Frame 89 (1).png

Wireframes

Design

Low Fidelity

Low fidelity designs allows for rapid iteration and validation of design concepts at an early stage of development

Frame 34 (1).png

Guidelines

Design

Guidelines

Open Sans

Aa Bb Cc Dd Ee Ff Gg Hh Ii Jj KkLl Mm Nn Oo Pp Qq Rr Ss Tt UuVv Ww Xx Yy Zz 0123456789

Open Sans Condensed

Aa Bb Cc Dd Ee Ff Gg Hh Ii Jj KkLl Mm Nn Oo Pp Qq Rr Ss Tt UuVv Ww Xx Yy Zz 0123456789

Color

Frame 35.png

High Fidility

Design

UI Anatomy 

This outlines the anatomy of the home screen and the design of the app.

Frame 36.png

High Fidility

Design

UI Screen
Notification
iPhone 13 & 14 - 47 (1).png
Frame 39 (1).png
Notifications 1 (1).png
Frame 38 (1).png
Push Notification

Once your results are prepared, your notifications will guide you to this page, where you can access the final outcome and opt to view a detailed report as well.

Components

Design

Components
Section 1.png

A components kit assists us in upholding consistency and fostering relatability and uniformity throughout the product.

High Fidility

Design

AI Authentication Flow
Frame 43.png

When the user scans their product, the app displays an authorization message.

The app prompts users to confirm whether they possess an NFT or not.

The app provides guidance on how to scan their product, and once all necessary visuals are ready, it collects additional required data seamlessly.

The app analyzes the visuals using the existing database and displays the results accordingly.

Thank You.

More Projects:
Frame 39540 (1).png
Frame 137.png
bottom of page