What is ThoughtID

Challenges & User Research


Design Process

Prototype & Deliverables


Think, then unlock!

Thought ID is a new biometric & neural authenticator. Your brain reaction towards certain images is your master key for all locks with the highest security but lowest effort ever.

Pick, predict, and Taunt your way to the top.

Taunt is the best way to watch esports: a game that challenges you and your friends to compete against each other (or the rest of the world) during live matches. We have launched it in the App Stores in early September 2018


The Challenge

Many people didn't trust biometrics authentications such as FaceID or fingerprint sensing. They felt these were more hackable than passwords.

User Research & Problem Space


As a team, we put the majority of work in user research to understand the true challenges. We focused a lot on finding out psychological and experience-based factors which made users not to trust the technologies which should have been much more trustable.


Competitive Studies of FaceID, TouchID, Iris Scan & Passwords


Draft survey designs before sending out


Survey Responses with valuable data and follow-up interest


Street Interviews about their perspective of such products


Contextual Interviews with the participants aged 18-35


Kept following up & joined the later test & prototype sessions

Survey & Problem Initiate

To define the more detailed challenges, we sent out surveys to recruit pariticipants and find draft problem focus. We kept our focus on balancing devices and the ages of participants for a better

Semi-structured Interview,
Card Sorting & Contextual Inquiry

We interviewed ten of them aged from 18 - 35 who used mobile biometrics authentication products. By recording and analyzing their experience and feedback, we created the user archetypes, journey maps and design principles and eventually found this true challenge.

User Archetypes & Journey Map Making

We then came up with four user archetypes and made each of them a journey map

Data Analysis, Insights & Brainstorm

The lack of general security knowledge led to different approaches to security among participants. There was a common perception that difficulty for the user equals difficulty for the hacker. Participants had an inaccurate mental model of how biometrics in mobile phones worked, which led to unfounded security concerns

People concern little about the true security, but more the feelings and the sense of trust.

Harder to be accessed = harder to be hacked.

Brains and memories were unhackable.

Since the majority believes their memories/brains much more than anything else, how about designing an authentication UX based on THINKING?

Idealation + Initial Sketches

Following User Research + Understand User Habits

Low-fidelity Prototype Design + UX Design Iterations

Feasibility & Application Potential Research

Refined Low-fidelity Prototypes + Various Usability Tests Iterations + Co-designing & Evaluating with Target Users

After 5 iterations together with participants, we made 2 low-fidelity prototypes with physical model + keynote + storytelling. We then had 5 participants do several usability tests and A/B tests and received their feedback.
For unlock UX, the user stated that they would love to have impressive but simple feedback that makes them both feel satisfied and safe and knowing what their thoughts have done. So that we present a more "processing" UX flow, using the concept of "delayed UX", and an explosion effect to show "the thing is unlocked because of your thoughts hit the set flow rightly."

ThoughID: Your simple thought is your most powerful & secured key

People trust mind-based/memory-based authentication the most. Indeed, it is impossible to hack one's mind. So here it is: ThoughtID. Just think, then unlock/identify yourself. It detects and matches your mind flow while reacting to a picture shown on the screen.

Think about what you see, the easiest and fastest authentication will happen with the highest security.

ThoughtID detects the user's brain reaction toward a customized image set by him/her. If the reaction fits correctly, the device will unlock instantly. Such "password" is so secured as each person's brain works so uniquely that there is no pattern or means to access that signal in your brain from a third party.

Analyzing brain signals and sync to the device with a built-in wearable sensor.

The mini sensor closely attached to the user's head brings the brain signals out of the head and transfers them into the devices. It will be a modulized built-in sensor that can be easily integrated into the glasses, Bluetooth headphones (AirPods etc.) or anything that the user would daily use.

ThoughtID is your master key for any lock! Your door, car, and more...

Taken the feedback from our testers, we ThoughtID should never be the mobile-only authentication as it is so secure and convenient. It will work with any devices supporting ThoughtID and trusted by you. Simplly walk towards to it, the distance sensor will active ThoughtID. Then, as always, think, and unlock.

Simple setting up session with gesture control + visual tutorial, then your ThoughtID will be ready for any devices

We want players to game for the game they are watching, and that never only limits on tapping on the cellphone's screen. Players want to be their favourite game character, so we offer them opportunities to imitate what the character is doing in the live match with gesture control UX designs.

For example, when the Riven controlled by Faker on the stage is using "lightning Q-A", dominating the team fight, the fans can shack their phone at a similar pace to win bonus for that extraordinary moments!

Prototype video: the shift from our draft prototype to the final refined design based on users' feedback

During our draft behaviour test, participants noted that with biometrics “you’re trading convenience for risk.” We saw that some were willing to trade incredibly private data (i.e. thought patterns) if there was a clear enough benefit. “If [the device] was always on me… I could use this for a lot of different things!” As long as participants saw the benefit of convenience, they seemed willing to sacrifice their personal data to a great extent.

We presented our insights, design and videos and physical prototype. We invited our initial research participants to evaluate our solution.