F-Secure KEY


A typical email address in the EU is linked more than 100 online accounts, all full of personal information.

Enter F-Secure KEY, an app developed by F-Secure, a leading cybersecurity international company. After оnboarding you log into the F-Secure KEY app which autofills passwords in your browser using master password verification.


Which function would it be a good idea for us to incorporate and test in the application?

To find a harmony between the Security versus Usability.

Data engineering: how best to organise 100s of things on a small amount of screen estate, regardless of whether that be records, gatherings, classifications and so forth.

F-Secure KEY
F-Secure KEY - screens


An initial proto persona workshop helped define our user
demographic: 20–70, carefully mindful. with extra cash
however to accomplish an increasingly adjusted
perspective on the clients and their dispositions/practices
we required a bundle of progressively subjective
information from which to draw and, in particular for UX,
sympathize. For this, we led 12 client interviews. We
likewise led focused and relative examination to figure
out the scene.


out research along these lines, we had the option to conclude some helpful key discoveries: Clients, by and large, come up short on the thought of what could befall them in the event that one of their records gets hacked; they additionally need the consciousness of the situations which could prompt an information break. Most clients have 3 passwords or less that they use for contemporary records, some have 1 ‘impervious’ one, which just should be taken once by a programmer to render every single another record with that secret key unreliable. Clients don’t care for sorting out information on versatile — in light of our exchanges around Google Drive and DropBox, the portable is utilized to check or refresh information stores yet not to roll out auxiliary improvements. Accommodation beats security: clients would prefer to be less secure than need to manage, for instance, 2-factor validation to get to a record. From these discoveries, in addition to our statistic, we had the option to create an essential persona and storyboard to speak to this bundle of research.

F-Secure KEY - interview
F-Secure KEY Password screen


In order to design a good user experience, we needed to select some key flows. We have specified a list of features we wanted to include in the app, and now the task was to sort them into the three key flows. Having
decided on features, we did workshops to create some flows that would be most essential to our persona Martta and settled on:
1 Adding an account manually
2 Appling passwords
3 Changing the password


We at that point ideated these key flows in a workshop to make a paper model. We started usability testing the wireframe flows in low-fidelity, then in high-fidelity. At each round we were collecting our notes and again synthesise our findings to iterate the user experience, making improvements at every stage.


Below are the screens of our final application featuring the sFavourites screen, starting screen and password screen. The stakeholders were particularly happy with the layout of the accounts page and the adherence to the F-Secure brand, look and feel.
Myself and my group all thought that it was illuminating and agreeable working on this project and feel happy with the work we delivered.