Dinesh Gupta

Lead UX Designer

Dinesh Gupta

Lead UX Designer

Dinesh Gupta

Lead UX Designer

Dinesh Gupta

Lead UX Designer

Dinesh Gupta

Lead UX Designer

Key Management

Key Management

Key Management

Key Management

Key Management

Title

Title

Title

Title

A More User-Centric, Accessible, Modern and Secure Approach

A More User-Centric, Accessible, Modern and Secure Approach

A More User-Centric, Accessible, Modern and Secure Approach

A More User-Centric, Accessible, Modern and Secure Approach

A More User-Centric, Accessible, Modern and Secure Approach

Navigate Section

Navigate Section

Navigate Section

Navigate Section

Navigate Section

Overview

Overview

Overview

Overview

Overview

Enterprise Application

Enterprise Application

Enterprise Application

Enterprise Application

CyberSource VISA

CyberSource VISA

CyberSource VISA

CyberSource VISA

Year

Year

Year

Year

2024

2024

2024

2024

Duration

Duration

Duration

Duration

4 Months

4 Months

4 Months

4 Months

Role

Role

Role

Role

Lead UX Designer

Lead UX Designer

Lead UX Designer

Lead UX Designer

Tools

Tools

Tools

Tools

Figma, usertesting.com

Figma, usertesting.com

Figma, usertesting.com

Figma, usertesting.com

Team

Team

Team

Team

Business Product Manager, Technical Product Manager, Lead Developer Lead, QA Lead, myself

Business Product Manager, Technical Product Manager, Lead Developer Lead, QA Lead, myself

Business Product Manager, Technical Product Manager, Lead Developer Lead, QA Lead, myself

Business Product Manager, Technical Product Manager, Lead Developer Lead, QA Lead, myself

Problem Statement

Problem Statement

Problem Statement

Problem Statement

Problem Statement

Background

Key Management is part of CyberSource's Payment Configuration that enables customers to manage their API keys, which are required to execute transactions and access other payment-related features. These API keys have expiration periods. Once expired, customers must generate and use a new API key. If a key expires without being updated, customers lose access to transactions and key platform features, leading to operational disruptions.

Challenges

Transaction Failures, Platform Downtime, and Revenue Loss

Transaction Failures, Platform Downtime, and Revenue Loss

Transaction Failures, Platform Downtime, and Revenue Loss

Transaction Failures, Platform Downtime, and Revenue Loss

Transaction Failures, Platform Downtime, and Revenue Loss

Accessibility Compliance Gaps and Legal Risk

Accessibility Compliance Gaps and Legal Risk

Accessibility Compliance Gaps and Legal Risk

Accessibility Compliance Gaps and Legal Risk

Accessibility Compliance Gaps and Legal Risk

Outdated UI & Inconsistency

Outdated UI & Inconsistency

Outdated UI & Inconsistency

Outdated UI & Inconsistency

Outdated UI & Inconsistency

High Volume of Unused Keys

High Volume of Unused Keys

High Volume of Unused Keys

High Volume of Unused Keys

High Volume of Unused Keys

Limited Sandbox Awareness

Limited Sandbox Awareness

Limited Sandbox Awareness

Limited Sandbox Awareness

Limited Sandbox Awareness

Objectives

Preventing transaction failures due to expired API keys

Improving key utilisation

Enhancing design to meet ADA Compliance Standards

Modernising the UI to align with CyberSource’s latest design standards and security recommendations

Research and Discovery

Research and Discovery

Research and Discovery

Research and Discovery

Research and Discovery

Heuristic Evaluation Findings

Error Prevention & Recognition

Error Prevention & Recognition

Error Prevention & Recognition

Error Prevention & Recognition

Error Prevention & Recognition

Lack of Clear Warning

Lack of Clear Warning

Lack of Clear Warning

Lack of Clear Warning

Lack of Clear Warning

Inconsistent Information Hierarchy

Inconsistent Information Hierarchy

Inconsistent Information Hierarchy

Inconsistent Information Hierarchy

Inconsistent Information Hierarchy

Date-Time Readability

Date-Time Readability

Date-Time Readability

Date-Time Readability

Date-Time Readability

Inconsistent status info Expired/Inactive

Inconsistent status info Expired/Inactive

Inconsistent status info Expired/Inactive

Inconsistent status info Expired/Inactive

Inconsistent status info Expired/Inactive

Understanding Primary Users

The Key Management Module primarily serves 2 types of users.

Account Managers

Developers

Dinesh Gupta, Lead UX Designer

Bangalore, India

Attributions

Last updated : May 2025

Dinesh Gupta, Lead UX Designer

Bangalore, India

Attributions

Last updated : May 2025

Dinesh Gupta, Lead UX Designer

Bangalore, India

Attributions

Last updated : May 2025

Dinesh Gupta, Lead UX Designer

Bangalore, India

Attributions

Last updated : May 2025

Dinesh Gupta, Lead UX Designer

Bangalore, India

Attributions

Last updated : May 2025