top of page
Screenshot 2024-02-28 at 9.23.03 AM.png

Passkeys help page

When was the last time you checked your password security?

In a world where digital threats loom large, securing data and identities has never been more critical. This presentation dives into the current landscape of passkey adoption, shedding light on how we can prioritize user trust and understanding to empower users in securing their digital identity through passkeys.  

Role

UX/UI Designer
UX Researcher

Time

10-12 Weeks

Responsibility

UX research, UX/UI design, UX strategy

Phase

Group 2 (4).png

Background

In January 2024, Forbes reported a massive breach involving major companies, exposing 12 terabytes of sensitive information, including passwords. Astra's findings indicate that in 2021, nearly 83% of companies reported experiencing phishing attacks, and shockingly, 22% of all breaches resulted from phishing scams. Also, according to CBS News, United Healthcare also faced a significant data breach in February 2024 due to a credential stuffing attack. 

The frequencies of these breaches are alarming and underscore a critical need for enhanced security measures in the digital realm. This is where passkeys come in - 

groundbreaking authentication technology designed to offer a more secure alternative to traditional authentication methods. 

How passkeys work

Passkeys use unique biometric data, such as fingerprints or facial recognition.

Once you create passkeys, two keys will be generated: A “public” and a “private” key. The private key with your biometrics stays on your device, and the public key with cryptographic keys stays on the website or app. You need both keys need to pair to authenticate.

 
 
 


 
 
 
 



 

Screenshot 2024-02-28 at 12.27.59 PM.png

Possession  based
+
Knowledge-based

Possession based
+
Inherence-based

Knowledge-based – something you know = passwords
Possession-based – something you have = code sent to your phone, device
Inherence-based – something you are =  biometric

Screenshot 2024-02-28 at 12.30.16 PM.png

Device unlocks via biometric (face ID or fingerprint)

Completes a handshake that represents the private key

This handshake is then matched to the public key.

According to Daniel from Corbado.com, there
are three common factors of authentication: knowledge-based, possession-based, and inherence-based.

 
Passkeys incorporate possession-based factors like your device and inherence-based factors like your biometrics, a more powerful authentication combination.

Discovery

Literature review

The literature review revealed that there has been a slow adaptation of passkeys due to three key factors: 

Familiarity and Perceived adequacy

Screenshot 2024-02-28 at 12.36.28 PM.png
  • Necessity is a top obstacle for passkey adoption.

  • Traditional methods like 2FA are seen as sufficient by users.

  • Companies are also facing challenges in deployability and financial considerations

User trust and self-efficacy in
biometric systems

Screenshot 2024-02-28 at 12.36.34 PM.png
  • Challenges hindering the implementation of biometrics

    • Concerns about privacy

    • Ease and perceived security of biometrics

    • Self-efficacy to interact with biometrics efficiently

Readability and transparency

Screenshot 2024-02-28 at 12.36.41 PM.png
  • Declined readability post-GDPR

  • Standardization of language = may impede user comprehension

  • Large quantity of new information

Discovery

User survey

After the literature review, I formed a hypothesis that if users are educated about the higher security level of passkeys over traditional methods and assured that biometrics stays locally on their device, they will be more willing to adopt passkeys. 

To support this hypothesis, I launched a user survey that began with an educational segment that highlighted the security advantages of passkeys and emphasized that biometrics stay on users' devices. 

Enhanced user confidence through education

71.4% of respondents expressed an increased sense of security and willingness to move forward with passkeys. 

Screenshot 2024-02-25 at 5.20.34 PM.png

Transparency and user control provide confidence in biometrics

Users want transparent assurance that biometrics stays on the local device and is not shared with anyone.

Screenshot 2024-02-11 at 1.53.56 PM.png

Defining the problem statement

Traditional authentication methods are highly vulnerable to phishing and other cybercrime. There is a need to create efficient passkey education streams to educate users on the advantages of passkey over traditional methods and foster increased understanding and trust to enhance their digital security. 

Ideating Design Solutions

Help page

  • Empower users and instill confidence through a more personalized, interactive education experience

  • Ensure transparency about how biometric data is used

  • Anchor menus and search bars to ease navigation through the large amount of content

  • Information on opt-in and opt-out options

Screenshot 2024-02-28 at 4.07.52 PM.png

Marketing campaign

  • ​​Provide current security level assessment and encourage users to take security measures with passkeys

  • Compatibility quiz / gamify educational content

  • Raise awareness about the benefits and security of passkeys

Screenshot 2024-02-28 at 4.08.17 PM.png

Enhancing user experience

  • Integrating visuals to enhance understanding

  • Incorporate step-by-step instructions along with visuals as a guide

  • Place the benefits of biometric and data storage information at the forefront for visibility and transparency

  • Conversational language

Screenshot 2024-02-28 at 4.08.57 PM.png

Design Prototype

Marketing:

Screenshot 2024-02-28 at 7.22.21 PM.png

Marketing: Log in screen

Screenshot 2024-03-01 at 2.15.49 PM.png

Marketing: Email campaign

Help page:

Screenshot 2025-01-25 at 10.04.01 PM.png

Help screen

Next steps

​​

  • Evaluative user testing 

  • Design iterations

  • Setting up KPIs

    • Passkey enrollment rate

    • Passkey usage frequency

    • Conversion rate

bottom of page