top of page

AurthenFT

Securely authenticating your assets with NFT technology.
Frame 28 (3).png
An app for making authenticating your physical assets using NFT's. 
About the product

In today's product landscape, the counterfeit goods market is estimated to exceed 3 trillion dollars. This vast market attracts numerous scammers who profit from selling fake products that are notoriously difficult to authenticate. Therefore, This solution focuses on creating a digital solution leveraging blockchain technology to assist individuals in authenticating their products effectively.

Overview

As an interaction design student at Pearl Academy, I had the chance to work on several projects. However, I am excited to share my experience working on a fintech product, which was a significant journey for me. In this case study, I will provide an in-depth exploration of the design process, unraveling the reasons and methods behind each step of transforming the usage of NFTs.

Frame 130.png
Frame 7 (7).png

Empathise

Secondary Research
Insights
Frame 132.png

With the growing use of online payments such as e-wallets and credit cards, consumers are becoming more and more dependent on the use of these methods to buy everyday items. When an online payment fails it can cause a huge problem and many people have missed flights because of a failed payment or been late to work.

Frame 133.png

E-commerce is a booming business. It's estimated to be worth $2.316 trillion by 2022, with an annual growth rate of 10.6% over the next five years. People are buying more goods and services online than ever before. However, scammers are following them into the virtual world, and stealing their money.

Frame 134.png

An NFT is an electronic representation of a physical item, such as an artwork, collectable or token. The digital information stored with the NFT can contain any kind of data, including the history of the product and it can be traced back to the company which authenticates it.

Primary Research
Primary Research

After doing the secondary research I was left with a lot of questions and to find answers I shared a survey and targeted gen z to find out what kind of person gets scammed. I figured out that 82% of them purchase high-value items more than 10 times a year and 27 % of them have been scammed before.

Frame 29.png
Pain Points

Functionality You Will Love

01

Struggling to securely store and protect all essential product-related documents.

02

Users encounter difficulties authenticating their high-value products both before and after purchase

03

Users lack visibility into their product's service or purchase history, leading to a frustrating user experience.

04

Authenticating their product proves to be both lengthy and expensive, creating a significant barrier for users seeking assurance and trust in their purchases.

05

Users are highly susceptible to misinformation and scams when buying from unreliable sellers, leading to a lack of trust and a negative user experience.

Define

Frame 141.png
Stakeholders
Frame 139.png
Personas.

With all the data I had, i split them into digestible bits by creating personas. This helps me to understand our user's goals, needs, experiences, and behaviours. Personas help me to get in their shoes and understand their perspective efficiently.

Maria Joshua
UX Persona.png
Empathy map
Frame 142.png
Customer Journey Mapping

With all the data I had, i split them into digestible bits by creating personas. This helps me to understand our user's goals, needs, experiences, and behaviours. Personas help me to get in their shoes and understand their perspective efficiently.

Group 134 (1).png
User Analysis
  • Scam Products: Scammers exploit users' vulnerability with counterfeit luxury watches that closely resemble authentic ones, making detection difficult.

  • Data Management: Storing and accessing product timelines and data, such as purchase receipts and authentication certificates, is complex and prone to errors.

  • Counterfeit Technology: Rapid advancements in counterfeit technology produce super fake watches that are challenging to distinguish from genuine ones.

  • Expertise and Resources: Limited access to expertise and resources makes authenticating luxury watches time-consuming and difficult for consumers.

Problem Statement

In this world of digital payments, everyone is looking for a safe, secure and fast form of payment. There are a lot of scammers trying to make money with scams and selling fake products which are very hard to authenticate. So I am creating a digital product using blockchain technology to bridge the gap between fintech and digital payment.

Ideate

Information Architecture

Information architecture is about how information and functions are structured within a system. It’s about organising and structuring the practical flow of information through an app effectively, and how the user interacts with the app to achieve a greater goal. It helps me to visualise and organise the app effectively so that i can have a clear vision while doing the user flow or the low fidelities.

Frame 135 (1).png
User Flow
Frame 136.png
Task Flow

I wanted to create a minimal design for this product so that there would be less clutter and it wouldn't be cluttered with too much information. I also wanted to make sure the image and the text were easy on the eyes so that people would want to read my description.

image 18.png
Low Fidelity
Frame 30.png

Prototype

UI Screens

I wanted to create a minimal design for this product so that there would be less clutter and it wouldn't be cluttered with too much information. I also wanted to make sure the image and the text were easy on the eyes so that people would want to read my description.

iPhone 13 mini - 12.png
Group 136.png
More Projects:
Frame 39540 (1).png
Frame 137.png
bottom of page