[Collaborative] UI/UX Design
Blockchain Credential Hub
Project Overview
The Blockchain Credential Hub is an internal product designed to streamline the issuance, storage, and verification of user credentials using blockchain technology. This innovative solution enhances security and trust by leveraging decentralized verification.
Design Features
The main design component is a block, referencing the "block" in blockchain. A blue-purple color scheme was chosen for its futuristic feel. As this is a deck for user management, the UX deviates from typical website design. Buttons and controls are placed on the side, allowing users to focus on the right side of the layout for all actions.
The project also includes a dark mode, aligning with contemporary design trends and enhancing user comfort on both mobile and desktop devices. Users can easily switch between light and dark modes, with the design of the cards and background colors adapting accordingly. This feature provides a visually appealing and flexible user experience, accommodating different lighting environments and user preferences.

Credential Issuance and Management
Users can create credentials by inputting the title, issue date, issuer (including logo), recipient's name, and recipient's Decentralized Identifier (DID). The system generates a credential based on the provided information, allowing users to preview it before finalizing. A comprehensive dashboard displays all issued credentials, providing users with easy access and management capabilities. Credentials can be verified and securely stored within the system.

Verification Process and Security
To address privacy concerns, users must verify their credentials by entering their secret recovery phrase, which is done by individually selecting each word of the phrase in the correct order. Once verified, the system notifies users and securely integrates the credentials into the hub. Given the sensitivity of credential data, the system ensures robust privacy and security measures. The secret recovery phrase acts as an additional layer of protection, ensuring that only authorized users can verify and store credentials.
