User experience and interface architecture for fraud and authentication workflows

Design for human control over AI in financial security

SICUREZZA CYBERS

Applicazione web

AI

CLIENTECallsign Ltd.
POSIZIONERegno Unito, Stati Uniti e Germania
SQUADRAUX designer, UI designer, interaction designer, sviluppatore React, project manager, product owner, architetto software
SITO WEB

Creative Navy worked with Callsign to turn its AI driven authentication and fraud detection platform into something senior bank risk teams could understand, configure and trust. The engagement focused on the policy engine controlling how the fraud detection model reacts to behaviour across login and transaction flows, shaped by regulations for enterprise UX in financial institutions.

This project is part of our continued work in security platform interface design and AI systems for financial services, where evidence based UX, policy engine design and analyst workflow optimization shape interfaces for regulated banking environments.

Callsign had a working fraud detection model and policy engine concept, yet analysts struggled to express real world fraud strategies in the interface. Rules were scattered, conflicts were hard to see and demonstrations to banks raised questions about traceability and audit trails.

We applied Dynamic Systems Design, a method that grows solutions through embedded experimentation, resolves tensions between local optimization and system coherence, and stewards implementation until organizations gain independence.

Our mandate was to model how fraud analysts think about risk, translate that into a configuration approach implementable in React and define a design system the internal team could extend. The entire effort took around six weeks, with front end engineers starting implementation after about four weeks while the design system continued to mature.

I NOSTRI CONTRIBUTI

Evidence-Based Research

Interaction Architecture

Sistema di progettazione

Prototipi ad alta fedeltà

Workflow Analysis

D3 Visualization Development

Garanzia di qualità

Capability Transfer

CLARIFYING THE POLICY ENGINE ARCHITECTURE

We started by making the mechanics of the policy engine explicit through domain learning. Policies in this context combine conditions on behavioural indicators such as device fingerprint, location change, spend velocity and previous failure history with outcomes such as allow, block or trigger step up authentication. The existing interface exposed these rules as database views and configuration tables. It did not match how analysts reason about fraud patterns or how they explain decisions to internal audit teams.

Through workshops with Callsign product, engineering and security specialists during Sandbox Experiments we mapped the existing rule structures, the fraud scenarios they needed to cover and the points where conflicts or gaps appeared. This mapping exercise led to a clear separation between the fraud detection model that scores events and the policy layer that applies thresholds, overrides and workflow decisions. The work became a piece of UX design for AI systems where the interface controls how model outputs flow into real world actions.

From there we defined an information architecture for enterprise security that treated a policy as the central object. Each policy bundles its conditions, actions, history and links to related rules. Analysts can follow a policy from definition through to evaluation without leaving context. Decisions are recorded in a way that supports audit review and regulatory checks related to SCA, PCI DSS and internal governance. We validated early versions of this structure with Callsign teams using concise scenarios rather than abstract diagrams, and adjusted based on their feedback.

Il processo in 5 fasi del controllo dei flussi di lavoro attraverso l'interfaccia utente

REFRAMING ANALYST JOURNEYS AND INTERACTIONS

With the architecture in place, we redesigned analyst journeys to reflect how fraud teams actually think through a case. The previous experience forced users to jump between configuration screens, reference documents and data tables when they wanted to adjust a single rule. We replaced this with a policy centric flow. Analysts identify a scenario, open the relevant policy set, adjust conditions in context and immediately see where in the workflow the change applies.

The core interaction concept was a three gesture model designed for interaction design for fraud analysts. Analysts drag to create or reposition nodes in the workflow, click to open and edit rule parameters inline and draw a connection to link nodes and define sequencing. These gestures are consistent across the tool, which keeps learning effort low for users who come from risk or compliance rather than product backgrounds.

We also had to make scope trade offs through tension-driven reasoning. For the first release we prioritised policy creation, conflict visibility and impact explanation over advanced collaboration features or full version history views. This decision reflected the immediate goal of making demos with risk and security teams at large banks effective and credible. Early internal testing with Callsign analysts confirmed that the new journeys reduced the time it took to express a common fraud scenario in the tool and made explanations during client calls more straightforward.

EVALUATION, SIMULATION AND DATA MODELLING

Configuration alone was not enough. Callsign needed a way for analysts and bank stakeholders to understand what a given set of policies would do in realistic scenarios. We created an evaluation mode where users define a simulation context using natural language style filters such as customer segment, geography or transaction type. The system then runs these settings through the fraud detection model and policy engine and presents the results in a focused analytical view.

The evaluation view is central to user experience for risk management tools because it closes the loop between configuration and impact. Analysts can see how often a scenario would lead to automatic approval, step up authentication or blocking, and can check whether high risk cases would slip through. To make this interpretable we relied on data visualisation for banking systems implemented with D Three, using graph and flow representations that highlight where traffic concentrates and where policies create bottlenecks.

We kept the relationship between configuration and evaluation very clear. Policies are always edited in the configuration space, and the evaluation environment consumes those definitions without letting users change them in place. This guard rail avoids untracked modifications during analysis. We used evidence based UX for AI to refine the evaluation flow, observing how analysts interpreted the charts and where misreadings occurred, then simplifying labels and interactions accordingly. The result is a controlled but flexible loop where analysts can test, adjust and justify policy strategies without exposing model internals.

DESIGN SYSTEM, ENGINEERING INTEGRATION AND HANDOVER

From the first weeks we treated every screen as part of a design system rather than a one off artifact during Concept Convergence. The system covers workflow construction, policy management, evaluation views and supporting navigation structures. Each component has documented states, interaction rules and usage notes. This foundation became a design system for banking products that helps Callsign maintain consistency across new security features and future modules.

On the engineering side we aligned early with the front end team. Policy and workflow components were modelled as React units that can be composed to create more complex screens without duplication. For example, the same policy summary module appears in configuration lists, in the workflow canvas and in evaluation results, with a consistent behaviour contract. The D Three based visualisations sit inside dedicated React containers so layout and rendering responsibilities are clearly separated, which supports performance tuning for larger datasets.

We structured deliverables to fit their development process during Implementation Partnership. Specifications followed the structure of their existing work in Git and Confluence, and we joined regular sessions with engineers to resolve edge cases before they reached implementation. After around eight weeks the project reached a stable state. The new workflows and policy management interfaces were ready for enterprise demos and the design system was complete enough to guide further internal work. Callsign's own designers later used this system as the basis for additional modules beyond fraud and authentication.

Quotes

È stato eccellente per me vedere le capacità intellettuali di Creative Navy, la loro conoscenza del dominio esperto e come articolano le soluzioni a un problema.

Yogesh PatelCTO @Callsign

TRASFORMAZIONE DEL DESIGN UX/UI IN 8 SETTIMANE

The redesigned policy engine and analyst workflows supported a series of demos with major UK banks and other large financial institutions that were evaluating their authentication and fraud detection platform. Product managers could present a configuration experience that matched how risk teams frame fraud problems, while engineering leads could see a clear path from interface behaviour to implementation. This alignment shortened sales conversations and reduced the amount of explanation required in technical follow up sessions.

Internally the new structure changed how the Callsign teams thought about the product. The separation between policy configuration and evaluation made it easier to plan future capabilities such as richer versioning, collaboration features and additional data feeds, since each would attach to a defined part of the system rather than to a freeform interface. The design system also reduced time to market for follow on features. In practical terms, the combined design and implementation work brought the enterprise ready policy engine to market roughly six months earlier than the previous approach would have allowed.

The organization gained intangible resources: judgment about what matters in fraud detection policy configuration for financial institutions, shared product intuition about how AI-driven security systems should expose control and traceability to risk analysts, and reasoning capability that allows teams to extend security modules without fragmenting the governance model. The system maintains competitive position by making fraud strategy configuration transparent and auditable, while competitors who prioritize automated black-box approaches over analyst control and regulatory traceability struggle to serve banking security teams working under strict compliance and risk management requirements.

For Creative Navy, the project confirmed the value of treating complex security UX as its own specialism rather than as a generic enterprise subcategory. The combination of analyst centred journeys, controlled AI behaviour, regulatory awareness and precise engineering integration is now part of how we approach similar work. Callsign continued to use the design system for at least two years after the engagement, extending it across additional security modules and maintaining coherence as the platform matured.

RISULTATI

Contratti con le maggiori banche britanniche vinti sulla base della demo

Design UX/UI consegnato in 6 settimanet

Frontend codificato con D3 consegnato in 4 settimane

Tempo di commercializzazione ridotto di 6 mesi

Il nostro sistema di progettazione è ancora in uso dopo 2 anni

Hai un progetto in mente?