Amanda Galvao

Work

About

Get in touch

Reusable ID

Turning identity verification into a reusable trust layer

Most identity systems require users to verify themselves repeatedly. This project explored how identity could be verified once and securely reused across services, reducing friction for users and lowering verification costs for the business.

Impact:

4x faster user journey | 2/3 cost-per-check reduction (returning users)

Company

OneID®

Role

UX/UI Designer

Timeline

Nov '24 - Mar '25

The Problem

1

User Friction

Returning users were forced to repeat the same verification process they had already completed. This added unnecessary steps and slowed down the experience.

2

Competitive disadvantage

Many competitors allowed a longer first-time verification but offered near-instant authentication for returning users by reusing verified identity data.

3

High operational cost

Because every verification triggered a new identity check, OneID incurred a cost each time a user authenticated, making the model expensive at scale.

This meant the current model was both inefficient for users and expensive for the business.

The Opportunity

Instead of focusing on faster verification, we reframed the challenge.

The question became:

"How can we verify users quickly?"

to

"How can we verify users once and reuse that trust securely?"

This opened the opportunity to design a Reusable ID system, allowing users to authenticate instantly after completing their first identity verification.

Potential benefits included:

Reduce friction for users during repeat verifications.

Lower costs by avoiding repeated data-source lookups.

Increase product stickiness and encourage return usage.

Support revenue growth through better unit economics.

Understanding the System

Placeholder image:


Systematic diagram

To make reusable identity possible, the system needed to support three key stages:

  1. Initial identity verification
    A secure identity check confirming the user’s identity.

  2. Trusted identity storage
    Securely storing proof that the user had completed verification.

  3. Fast returning authentication
    Allowing users to authenticate using previously verified identity data.

Designing this system required balancing speed, security, and transparency.

Cross-Industry Inspiration

While exploring solutions, we looked beyond the digital identity space.

Most identity verification providers rely on long onboarding flows and dedicated mobile apps to store and manage credentials. While secure, these approaches introduce significant friction.

We examined how other industries solve a similar trust challenge: allowing users to reuse sensitive information securely across multiple services.

Payment platforms such as Shop Pay and PayPal offer a compelling alternative.

Shop Pay

Shop Pay integrates directly into the checkout flow, allowing users to create an account and store payment details with almost no interruption to the purchase journey. The experience is intentionally low-profile: authentication appears only when necessary, and returning users can complete transactions with minimal effort.

PayPal

PayPal, while more branded, follows a similar principle. It allows users to authenticate quickly and pay without repeatedly sharing bank or card details with individual merchants.

In both cases, the service acts as a trusted intermediary, enabling users to reuse sensitive data while keeping it protected.

In both cases, the service acts as a trusted intermediary, enabling users to reuse sensitive data while keeping it protected.

This revealed a powerful interaction model:

Trusted credentials should work as a lightweight layer within existing journeys, rather than requiring a separate destination or app.

First time experience:

Identity Industry Today

User

service

app download

app onboarding

verification

share details

service

Payment (e.g. ShopPay)

User

checkout

enter details

save & share details

payment completed

Reusable ID (OneID vision)

User

service

verification

save & share details

service (completed)

Design Principles

If payment credentials can be reused seamlessly across the web, the same approach could potentially apply to KYC, age and identity verification. 

This reframed the challenge from designing a faster identity check to designing a reusable trust layer for digital identity.

Verify once

Users should only verify a scope (e.g. name) when necessary, without the need to download an app or onboard to service.

Speed for returning users

Authentication for returning users should take seconds and not rely on passwords or memory.

Maintain trust

Returning users should clearly understand what data is being shared with which business.

Authentication

For both user experience and security, we decided to proceed with passkeys for authentication. At this stage, it was still something new but rapidly expanding.

We considered magic links as an alternative for passkey, but in tight dev resourcing, we included passkey only in our first MVP study, accepting that coverage wasn't universal yet.

Edge Cases & Recovery

1. Passkey missing or unavailable

We cannot login user > Full identity verification with any provider > Create new passkey

In this case, we can't connect the user to an account, so we can't suggest them a provider. The user re-verifies themselves as a first time user, and create a new passkey.

If the user selects a different provider, this will result in a new account. This is an issue we accepted to have at a MVP stage since we hadn't validated passkey as authenticator yet.

2. User authenticated but encryption key unavailable

User login > No encryption key found to retrieve their data > Re-verify subject identifier with primary ID provider (at this stage, a bank)

Constraints and Trade-Offs

1

Security requirements

Strict security standards. Putting users' personal and bank details in risk was never an option.

2

Technical constraints

Coordination between authentication systems, identity storage, and verification services.

MVP Scope

To validate the concept quickly, we prioritised the core reusable authentication flow while postponing advanced recovery scenarios.

These trade-offs allowed the team to ship a lean MVP and learn from real usage.

Iteration Strategy

The initial release focused on validating the value of reusable identity.

1

Authentication method validation

We validated that passkey is supported in 84% journeys.

2

Multi-providers coordination

Next, we will study data re-verification process and how to handle multi-data sources vs different compliance requirements.

3

Recovery improvement

With more providers enabled, account recovery will have to rely less in an provider and more in data match.

Impact

Measurable Outcomes

4x

Faster than verifying via a bank

1/3

Cheaper cost-per-check when re-using data

Lessons Learned

Trust is critical in authentication systems

Users must clearly understand when identity data is reused.

Speed drives perceived product quality

Reducing authentication time significantly improved the overall experience.

System design matters as much as UI design

The biggest improvements came from redesigning the authentication model rather than individual screens.

Get in touch

I'm always interested in hearing about new projects and opportunities. Whether you have a question or just want to say hi, feel free to reach out.

Email

hello@amandalo.design

LinkedIn

Twitter

Based in London, UK

Name

Your name

Email

your.email@example.com

Message

Tell me about your project...

Send message

Get in touch

Email

a.galvao@outlook.com

Linkedin

linkedin.com/in/amanda-galv/

@2026 London