11 min

Face-to-Face Identity Verification for Electronic Signatures: Complete UK Guide

Comment fonctionne la vérification d’identité pour une signature électronique sécurisée _

Discover Yousign's electronic signature

Try our secure, compliant, and easy-to-use eSignature solution free for 14 days.

Face-to-face identity verification remains a trusted method for confirming someone's identity before issuing electronic signatures, but is it always necessary? This comprehensive guide explains when physical presence is required in the UK, what alternatives exist, and how businesses can choose the most secure and cost-effective verification method for their needs.

Whether you're implementing qualified electronic signatures (QES) for your business or simply trying to understand UK identity verification regulations post-Brexit, this guide covers everything from legal requirements to practical implementation.

Brief summary:

  • Face-to-face verification is optional, not mandatory for UK qualified electronic signatures under eIDAS Article 24—it's one of four accepted methods alongside eID schemes, qualified certificates, and ICO-approved alternatives
  • Remote video identification achieves equivalent security with superior user experience: 5-15 minutes completion vs. days for face-to-face, and only €5-12 per verification
  • UK eIDAS post-Brexit creates one-way recognition: EU qualified trust services are recognised in the UK, but UK services are NOT recognised in the EU; no UK QTSPs exist as of February 2026
  • Biometric data is GDPR special category data requiring enhanced protection (AES-256 encryption, explicit legal basis, EU/UK-only storage, 825-day retention limits)
  • Digital Identity Wallets (EUDI in EU, GOV.UK One Login in UK) will transform verification by 2027-2030, enabling instant qualified certificate issuance

What Is Face-to-Face Identity Verification?

Definition and Purpose

Face-to-face identity verification is the process where an individual appears in person at a designated location—or a registration officer visits them—to confirm their identity credentials. This typically happens when issuing qualified electronic signature certificates under UK eIDAS regulations.

The process involves:

  • Physical presentation of original identity documents (passport, driving licence, national ID card)
  • Visual comparison between the document photo and the person presenting it
  • Verification of document security features (holograms, watermarks, biometric chips)
  • Recording of identity details and evidence for audit purposes

Important

Face-to-face verification is NOT mandatory for qualified electronic signatures in the UK. It's one of four accepted methods under Article 24 of UK eIDAS regulations, alongside eID schemes, qualified certificates, and other ICO-approved alternatives.

Face-to-Face vs. Remote Identity Checks

The key difference lies in where and how the verification happens:

Aspect

Face-to-Face

Remote Verification

Location

Physical presence at verification site

Remote via video call or digital flow

Documents

Original physical documents inspected

Documents presented to camera; NFC chip reading

Verification method

In-person visual comparison

Facial recognition with liveness detection

Security

Eliminates digital injection attacks

Requires advanced fraud detection (PAD, IAD)

Convenience

Requires travel and appointment

24/7 availability from anywhere

Speed

Can take days to complete

Often completed in minutes

Key insight:

While face-to-face verification has traditionally been considered the "gold standard," modern remote methods using AI-powered biometric verification and NFC chip reading can now achieve equivalent security levels when properly implemented with robust attack detection measures.

When Is Physical Presence Required?

Under UK eIDAS regulations, physical presence is optional, not mandatory, for qualified electronic signatures. However, certain situations may favour or require face-to-face verification:

Regulatory contexts:

  • When other Article 24 methods (eID schemes, remote verification) haven't received ICO pre-approval
  • For Enhanced DBS (Disclosure and Barring Service) checks requiring GPG 45 Score 4 evidence validation
  • When national security or high-risk sectors demand maximum assurance levels

Practical scenarios:

  • High-value property transactions where parties prefer maximum identity assurance
  • Legal/notarial contexts with traditional in-person witnessing requirements
  • Government services with conservative identity verification policies
  • Individuals with limited digital literacy or disabilities who prefer in-person assistance

Important

As of February 2026, there are no UK-registered Qualified Trust Service Providers (QTSPs). The UK market relies entirely on EU-registered providers offering qualified trust services. These providers predominantly use remote video identification rather than face-to-face verification due to better scalability and user experience.

UK Legal Requirements for Identity Verification

UK eIDAS Regulation Post-Brexit

Following Brexit, the UK retained the core eIDAS framework but made critical modifications through The Electronic Identification and Trust Services for Electronic Transactions (Amendment etc.) (EU Exit) Regulations 2019.

What changed:

  • Chapter III (Trust Services) retained: Electronic signatures, seals, timestamps, registered delivery, and website authentication continue to operate under eIDAS principles
  • Chapter II (Electronic Identification) revoked: No mutual recognition of eID schemes between UK and EU
  • One-way recognition: EU qualified trust services are recognised in the UK, but UK qualified services are NOT recognised in the EU

Critical asymmetry

EU qualified trust services ARE recognised in the UK, but UK qualified services are NOT recognised in the EU. As of February 2026, there are no UK-registered QTSPs—the market relies entirely on EU providers.

eIDAS 2.0 does not apply:

The revised EU regulation (2024/1183) introducing Digital Identity Wallets applies only to EU Member States. The UK continues operating under the original eIDAS framework amended for Brexit.

ICO Requirements for Qualified Electronic Signatures

The Information Commissioner's Office (ICO) serves as the sole UK supervisory body for trust services. For identity verification in qualified signature contexts, the ICO requires:

Article 24 Identity Verification Methods (four alternatives):

  1. Physical Presence (Face-to-Face)
  2. In-person verification with appropriate evidence and procedures per national lawPersonnel must be trained in document fraud detection (3-year refresh minimum)
  3. Electronic Identification (eID)
  4. Using eID means meeting EU eIDAS "substantial" or "high" assurance levelsNote: Post-Brexit, UK doesn't participate in EU eID mutual recognition framework
  5. Qualified Certificate-Based
  6. Using previously verified qualified signature or seal certificatesCertificate must have been issued using Methods 1, 2, or 4
  7. Alternative Recognised Methods
  8. Other identification methods providing "equivalent assurance to physical presence"Must be confirmed by conformity assessment bodyRequires ICO pre-approval for remote identity proofing mechanisms

Key requirement:

Remote identity proofing methods require ICO review and approval before use. UK-based providers cannot directly use EU conformity assessment reports without UK-specific assessment for their UK legal entity.

Good Practice Guide 45 (GPG 45) Standards

GPG 45 is the official UK Government identity proofing standard published by the Department for Science, Innovation & Technology. It defines a 5-step identity checking process, each scored 1-4:

1. Evidence Collection (Strength Check) Score based on document security features, unique identifiers, and trusted source characteristics.

2. Evidence Validation (Validity Check)

  • Score 1-3: Remote validation methods acceptable
  • Score 4: Person physically present required in controlled conditions
  • Must verify cryptographic security features, confirm non-expired status, check not cancelled/lost/stolen

3. Activity History Check Verify claimed identity existed over time through authoritative records (credit files, electoral roll, utility bills).

4. Identity Fraud Risk Check Use authoritative sources to verify identity not stolen, synthetic, or otherwise fraudulent.

5. Verification Check (Proof of Possession)

  • Score 1: Knowledge-based verification (security questions)
  • Score 2: Photo matching (in-person or remote) OR biometric matching
  • Score 3: Enhanced photo/biometric matching with annual training, liveness detection, spoofing detection
  • Score 4: Biometric matching under controlled conditions detecting sophisticated spoofing (3D avatars, masks)

Four Confidence Levels: Low, Medium, High, Very High—determined by combination of scores across all five checks.

Critical insight:

GPG 45 permits both face-to-face and remote identity verification. Physical presence is not mandatory but achieves higher scores in certain contexts, particularly for Evidence Validity Score 4 and Verification Score 4 requirements.

How Face-to-Face Identity Verification Works

The 5-Step Identity Proofing Process

Based on ETSI TS 119 461 technical standards, face-to-face identity verification follows a structured five-task framework:

1. Initiation

  • Applicant provides informed consent for identity verification
  • Clear guidance on process, timeline, and data usage
  • Explanation of documents required and verification method

2. Attribute & Evidence Collection

  • Gathering identity information from official documents
  • Applicant presents original physical documents at verification location
  • Registration officer collects: full name, date of birth, document numbers, biometric data (photo), address

3. Attribute & Evidence Validation

  • Verifying document authenticity using security feature inspection:Visual checks: Holograms, watermarks, UV features, microprinting, tactile elementsMachine Readable Zone (MRZ): OCR extraction and cross-referencingNFC chip reading (if available): Cryptographic validation of data stored in biometric passports/ID cards
  • Cross-referencing with authoritative sources (PRADO database for genuine documents)
  • Confirming document validity (not expired, reported lost/stolen)

4. Binding to Applicant

  • Confirming the person presenting documents matches the identity evidence
  • Methods:Manual face verification: Registration officer visually compares applicant to document photoBiometric matching: Automated facial recognition comparing live photo to document photoHybrid approach: Automated analysis with manual officer review
  • For GPG 45 Score 3+: Must include detection of presentation attacks (masks, photos, videos)

5. Issuing Proof

  • Creating identity proofing result documentation
  • Recording: verified identity details, verification date/time, method used, operator identity, supporting evidence
  • Retention period: 825 days minimum for qualified certificate issuance (DigiCert standard)
  • Encrypted transmission to Trust Service Provider for certificate issuance

Asynchronous processing:

The applicant doesn't need to be physically present during all validation steps. After document collection, registration officers can work remotely reviewing evidence and making decisions.

Documents Accepted for Verification

Primary Documents (highest strength in GPG 45 context):

  1. Passport
  2. Most universally accepted across 50+ countriesContains multiple security features: holographic elements, biometric chip, MRZUK passport includes NFC chip (electronic passport) with cryptographically signed biometric data
  3. UK Photocard Driving Licence
  4. Accepted throughout UK for identity verificationIncludes photograph, signature, unique licence numberCan be validated against DVLA database
  5. National ID Card
  6. Accepted from all EU member states and EEA countries (Iceland, Liechtenstein, Norway)Must include photograph and machine-readable features
  7. Biometric Residence Permit (BRP)
  8. For foreign nationals residing in UKContains biometric chip with facial image and fingerprint data

Document Requirements:

  • Must contain holographic security features and photograph
  • Must be legible in Latin characters and Arabic numerals
  • Must include machine-readable zone (MRZ)
  • Must be valid (not expired)
  • Must be presented in original form (photocopies not accepted)

Minimum 3 security features must be verified for physical documents. For remote verification, at least 2 must be optically variable (holograms, colour-shifting ink).

Biometric Checks and Security Features

Facial Recognition Process: Modern face-to-face verification increasingly incorporates biometric technology even in physical settings:

  1. Image Capture
  2. High-quality photo taken of applicant in controlled lightingAutomated quality checks for usability (ISO/IEC FDIS 29794-5 compliance)Multiple angles may be captured for 3D analysis
  3. Comparison Methods
  4. Manual verification: Officer visually compares live person to document photo (traditional method)Automated biometric matching: AI compares captured photo to document photo using deep learning algorithmsHybrid approach (recommended): Automated analysis provides confidence score; officer reviews and makes final decision
  5. Liveness Detection (for automated/hybrid approaches)
  6. Active liveness: Applicant prompted to perform actions (smile, blink, turn head)Passive liveness: System analyses subtle movements, skin texture, blood flow patternsDetects presentation attacks using photos, videos, masks, or deepfakes

NFC Chip Reading (Enhanced Security): For electronic passports and modern ID cards:

  1. System extracts passport number, date of birth, expiration date from photograph/MRZ
  2. Uses extracted data as encryption key to access NFC chip
  3. Downloads biometric data (facial image, sometimes fingerprints) and digital signature from chip
  4. Validates digital signature proves document authenticity and hasn't been tampered with
  5. Compares surface data to chip data, and live photo to both images
  6. Verification time: typically under 60 seconds
  7. Security level: Near-forgery-proof—data is digitally signed by issuing government authority

GDPR Compliance Note:

Biometric data is classified as special category data under GDPR Article 9, requiring explicit legal justification for processing. Face-to-face verification for qualified signatures typically relies on "legal obligation" or "substantial public interest" legal grounds. Data must be encrypted (AES-256 at rest, TLS in transit), stored within EEA, and retained only as long as necessary.

Who Can Perform Face-to-Face Identity Verification?

Trusted Professionals and Registration Authorities

Under UK eIDAS regulations, identity verification must be performed by authorised entities acting as Registration Authorities (RA) on behalf of Qualified Trust Service Providers.

Authorised professionals include:

1. Notaries

  • Legal professionals authorised to witness signatures and verify identities
  • Trusted by multiple QTSPs including Sectigo for eIDAS certificates
  • Can certify true copies of identity documents
  • Particularly common for international document verification

2. Solicitors and Attorneys

  • UK-qualified legal professionals
  • Recognised for identity verification in financial and legal contexts
  • Often used for high-value transactions requiring qualified signatures

3. Certified Public Accountants (CPAs)

  • Professional accountants with recognised credentials
  • Accepted by some QTSPs for business-related certificate issuance
  • Common in corporate signing authority verification

Key Requirements:

  • Must be independent third parties (not related to applicant)
  • Must verify identity using prescribed methods and document types
  • Must maintain records of verification for audit purposes
  • Should have training in document fraud detection and security features
  • Must follow ICO-approved procedures when acting as Registration Authority

Costs: Professional fees typically range from £50-150 for identity verification services, though some solicitors include this as part of broader legal service packages.

Post Office and Digital Identity Services

UK Post Office Services:

While the Deutsche Post POSTIDENT service operates across 8,500+ German post offices, the UK currently lacks an equivalent nationwide post office identity verification scheme specifically for qualified electronic signatures.

However, UK Post Offices do provide:

  • Document certification services: Certifying true copies of passports, driving licences
  • Identity verification for government services: GOV.UK Verify (now being phased out)
  • Basic identity checks: For financial services under AML regulations

Limitations: Post Office staff in the UK are not currently certified as Registration Authorities for qualified electronic signature certificate issuance under ICO supervision.

GOV.UK One Login and Digital Identity Schemes

GOV.UK One Login:

The UK government's new unified identity and sign-in system aims to replace GOV.UK Verify (being phased out).

How It Works:

  1. Create Account: User registers with email, phone number, password
  2. Identity Verification: Multi-level process depending on confidence requiredMedium confidence: Document photo upload + facial recognition selfieHigh confidence: Additional checks (not yet widely available)
  3. Reusable Credential: Use same login across 200+ government services

Identity Verification Process:

  • Photograph identity document (passport or driving licence)
  • Take selfie for facial recognition
  • AI compares selfie to document photo
  • Liveness detection prevents spoofing attacks
  • Activity history checks against credit reference agencies
  • Fraud checks using government databases

Current Limitations for eSignatures:

  • Not recognised as Article 24 eID method: As of February 2026, no UK eIDAS reference exists recognising GOV.UK One Login as approved identity verification method for issuing qualified certificates
  • No high assurance level: Doesn't yet meet eIDAS "high" Level of Assurance required for eIDAS 2.0-equivalent certificates
  • Government services only: Currently designed for public sector, not private sector trust services

Future Potential: The UK government is exploring closer alignment between GOV.UK One Login and trust services requirements through ongoing consultations, so this may change in future.

Alternatives to Traditional Face-to-Face Verification

Video Identification with Live Operator

Most Popular Remote Method:

According to ENISA's 2021 survey, 11 of 30 responding European Trust Service Providers reported using video with operator for qualified certificate issuance.

Good to know

Video identification is the most widely adopted alternative: 11 of 30 European TSPs use it as their primary method for qualified certificates. Typical cost: €5-12 per verification with 5-15 minute completion time.

How It Works:

  1. Session Initiation
  2. User schedules video call or connects to on-demand service24/7 availability with multilingual operators commonTypical wait time: immediate to 15 minutes
  3. Document Presentation
  4. User presents identity document to cameraOperator guides user to show all pages, security featuresDocument photographed from multiple anglesMRZ captured and validated in real-time
  5. Identity Verification
  6. Live comparison between user and document photo"Proof of life" actions requested (smile, blink, turn head)Operator asks security questions to confirm detailsAI assistance analyses document authenticity while operator supervises
  7. Recording and Evidence
  8. Entire session recorded for audit purposesTwo photos from ID document capturedUser photo taken during video sessionEncrypted results transmitted within minutes to QTSP

Security Measures:

  • Liveness detection: Random challenge-response actions prevent pre-recorded videos
  • Document authentication: AI analyses security features, verifies with PRADO database
  • Operator training: Annual training minimum on fraud detection, document security features, attack detection
  • ETSI TS 119 461 compliance: Meets "attended remote" identity proofing requirements

Providers: IDnow VideoIdent, WebID VideoID, Signicat, ZealID

AI-Powered Automated Verification

Fully Automated Remote Identity Proofing eliminates the human operator entirely, using artificial intelligence for end-to-end verification.

How It Works:

1. Document Capture & Analysis

  • User photographs identity document with smartphone camera
  • AI extracts data from MRZ (Machine Readable Zone) using OCR
  • System analyses document security features: Holographic elements detection; Microprinting verification; UV feature analysis (if device equipped); Document structure and format validation

2. NFC Chip Reading (for electronic documents)

  • User taps passport/ID card to NFC-enabled smartphone
  • App extracts biometric data and digital signature from chip
  • Cryptographic validation proves document authenticity
  • Highest security level: Near-forgery-proof verification

3. Facial Biometric Matching

  • User captures selfie video (not still photo)
  • AI compares live facial image to document photo
  • Presentation Attack Detection (PAD): ISO/IEC 30107-3 certified systems detect:Masks, makeup, 3D-printed faces ; Photos or videos held up to camera ; Deepfakes and synthetic media ; Face swaps
  • Injection Attack Detection (IAD): Prevents bypassed sensors and injected video streams

4. Liveness Detection

  • Passive liveness: Analyses subtle facial movements, skin texture, blood flow patterns
  • Active liveness: Prompts user actions (blink, smile, turn head)
  • Adaptive liveness: Adjusts challenge difficulty based on risk assessment

5. Decision & Issuance

  • AI generates confidence score for identity match
  • Automated decision within 30 seconds to 3 minutes
  • Human review queue for uncertain cases
  • Qualified certificate issued immediately if approved

Technology Providers: Innovatrics (NIST FRTE ranked 2nd), Paravision (Top-5 NIST FRTE), Oz Forensics (99.99% accuracy), Ondato (99.8% verification accuracy)

Security and Compliance Considerations

GDPR Requirements for Biometric Data

Special Category Data Classification:

Biometric data used in identity verification is classified as special category personal data under GDPR Article 9, requiring enhanced protection and explicit legal justification.

Good to know

Digital photographs alone are NOT biometric data under GDPR—only when processed into templates for automated matching. Simple photo storage for ID verification doesn't trigger Article 9 special category obligations.

Legal Grounds for Processing:

Organisations may only process biometric data under specific Article 9(2) conditions:

  1. Explicit consent (Article 9(2)(a))
  2. Must be freely given, specific, informed, and unambiguousSeparate from general terms and conditionsEasily withdrawable
  3. Legal obligation or public interest (Article 9(2)(b), (g))
  4. Law enforcement, national securityQualified trust services meeting legal obligations under UK eIDASMost common basis for QES identity verification
  5. Substantial public interest (Article 9(2)(g))
  6. Must be specified by UK lawProportionate to aim pursuedContains suitable safeguards

Technical Security Requirements:

Encryption Standards:

  • AES-256 encryption for data at rest (stored biometric templates)
  • TLS 1.3 for data in transit (transmission of identity data)
  • Cryptographic keys managed in Hardware Security Modules (HSMs) for QTSPs

Access Controls:

  • Role-Based Access Control (RBAC): Only authorised personnel access biometric data
  • Multi-Factor Authentication (MFA): Required for all systems accessing special category data
  • Principle of least privilege: Users granted minimum necessary access rights
  • Audit logging: All access attempts recorded with timestamps and user identity

Storage and Retention Requirements:

Data Localisation:

  • UK or EEA hosting required: Biometric data must be stored within UK/EEA to avoid international transfer complexities
  • If storage outside EEA necessary: Requires adequacy decision or appropriate safeguards (Standard Contractual Clauses)

Retention Schedules:

  • Principle: Keep only as long as necessary for purpose
  • For qualified certificate issuance: Evidence typically retained 825 days (DigiCert standard, ~27 months)
  • After retention period: Automatic deletion procedures must be implemented
  • Audit trail: Maintain records of deletion for compliance demonstration

Compliance Failures—Real-World Penalties:

  • Clearview AI (France): €20 million fine for collecting biometric data from 20+ billion photos without consent or legal basis
  • Mercadona (Spain): €2.52 million fine for facial recognition in stores without proper consent and transparency

Fraud Prevention and Liveness Detection

Primary Fraud Threats:

1. Digital Injection Attacks (fastest-growing threat)

  • 255% increase in 2023; now 5x more common than presentation attacks
  • Attacker inserts false data into verification platform's information stream
  • Methods: Emulators, virtual cameras, third-party data sources posing as webcams
  • Real-world impact: Hong Kong company lost $25 million to deepfake video injection
  • Defence: Not applicable to face-to-face verification (eliminates digital transmission vector)

2. Presentation Attacks

  • Physical objects presented to fool biometric systems
  • Types:
    2D attacks: Printed photos, displayed on screens, masks
    3D attacks: Silicone masks, 3D-printed faces, makeup
    Video replay: Pre-recorded videos played back
    Deepfakes: AI-generated synthetic videos (29% of businesses reported deepfake fraud in 2022)
    Face swaps: Real-time facial replacement using apps (704% increase in 2023)
  • Defence: Liveness detection, material analysis, depth sensing

3. Document Fraud

  • Forged or altered identity documents (~20% of e-signature fraud cases)
  • Stolen documents not yet reported invalid
  • Counterfeit documents with fake security features
  • Defence: Document authentication technology, PRADO database cross-referencing, NFC chip validation

Face-to-Face Advantage:

Physical presence verification provides inherent protection against certain fraud vectors:

  • Eliminates digital injection attacks entirely: No digital transmission of identity data during capture
  • Direct observation: Registration officer can detect suspicious behaviour, nervousness, coaching
  • Tactile verification: Officer can physically handle documents, feel security features (raised print, holograms)
  • Environmental control: Controlled lighting and setting optimise document inspection
  • Interview capability: Officer can ask spontaneous questions to assess genuine knowledge of identity details

Cost and User Experience Comparison

Modern electronic signature platforms like Yousign streamline the identity verification process by integrating multiple methods in a single workflow. UK businesses can:

  • Choose verification method based on risk level and user preference (video ID, document + selfie, or eID schemes)
  • Automatically route users through appropriate verification flow
  • Issue qualified certificates instantly after successful verification
  • Maintain full GDPR compliance with encrypted biometric data storage
  • Access audit trails and compliance reporting for ICO requirements

With thousands of businesses using Yousign across Europe, our platform provides the flexibility to adapt as digital identity standards evolve, supporting future integration with GOV.UK One Login and Digital Identity Wallets.

Face-to-Face vs. Remote: Pros and Cons

Method

Initial Investment

Annual Operational Cost

Cost per Signature

User Abandonment Rate

Effective Cost*

Face-to-Face

£100,000

£120,000

£12.00

70%

£40.00

Video ID

£50,000

£150,000

£7.00

20%

£8.75

AI Automated

£150,000

£60,000

£1.50

15%

£1.76

Digital Identity (future)

£100,000

£20,000

£0.20

5%

£0.21

*Effective cost accounts for abandonment (wasted acquisition costs allocated across completed signatures)

User Abandonment Statistics:

Critical Friction Points:

  • 68% abandonment in banking/fintech due to lengthy or complex processes
  • 60-80% overall abandonment across industries during onboarding
  • 1 in 5 users abandon account creation due to UX friction; 1 in 3 for younger generations
  • 32% abandonment rate after 10 minutes of verification process
  • Face-to-face requirement cited as primary cause of abandonment in multiple industries

Future Trends: Digital Identity Wallets

EU Digital Identity Wallet (EUDI Wallet) Overview:

Regulatory Mandate (eIDAS 2.0 – Regulation EU 2024/1183):

  • All 27 EU Member States must provide EUDI Wallets by December 2026
  • Regulated industries (banking, telecommunications, transport) must accept EUDI Wallets from November 2027
  • Target: 80% citizen adoption by 2030

Impact on Qualified Electronic Signatures:

Instant Certificate Issuance:

  • Current process: Identity verification → Wait 24-48 hours → Certificate issued
  • EUDI Wallet process: Present wallet attestation → Certificate issued instantly
  • Government-verified identity eliminates need for separate QTSP verification

UK Context and Divergence:

EUDI Wallets Do Not Apply to UK:

  • eIDAS 2.0 is EU-only regulation; does not extend to UK post-Brexit
  • UK developing independent UK Digital Identity Trust Framework statutory scheme
  • No current timeline for UK government-issued digital identity wallet

UK Digital Identity Trust Framework:

Current Status (as of February 2026):

  • Placed on statutory footing through Data (Use and Access) Act 2025
  • Over 50 Digital Verification Service (DVS) providers independently certified
  • Used for: right to work checks, right to rent checks, DBS checks, age verification
  • Not yet integrated with trust services (no UK eIDAS reference recognising DVS providers as Article 24-compliant)

Simplify your electronic signature process

Yousign offers compliant remote identity verification for UK businesses

Conclusion

Face-to-face identity verification has served as the trusted benchmark for confirming identities for decades, but the landscape is transforming rapidly. While physical presence eliminates certain digital attack vectors and provides the highest trust perception, it comes with significant trade-offs: poor user experience (60-80% abandonment rates), high operational costs, geographic limitations, and extended timelines (days to weeks).

For most UK businesses implementing electronic signatures, the optimal approach in 2026 is remote video identification as the primary method—widely accepted for qualified certificates under UK eIDAS Article 24, fast (5-15 minutes), cost-effective (€5-12 per verification), and providing human interaction for trust. Face-to-face should be reserved for accessibility needs, specific regulatory contexts requiring GPG 45 Score 4 verification, or high-value scenarios where parties explicitly prefer in-person assurance.

The future of identity verification lies in reusable digital identities issued by governments or certified providers, enabling instant authentication for qualified signatures while maintaining the highest security standards. Until then, remote verification methods strike the optimal balance between trust, user experience, cost, and regulatory compliance.

FAQ

  • Is face-to-face identity verification mandatory for electronic signatures in the UK?

    No, face-to-face verification is not mandatory for electronic signatures, including qualified electronic signatures (QES). UK eIDAS regulations offer four alternative methods for identity verification under Article 24: physical presence (face-to-face), electronic identification (eID), qualified certificate-based verification, or other approved alternative methods confirmed by conformity assessment bodies. Remote video identification and AI-powered automated verification can provide equivalent security when properly implemented.

  • What documents do I need for face-to-face identity verification?

    For face-to-face verification in the UK, you typically need one primary identity document: UK passport (most widely accepted), UK photocard driving licence, National ID card (for EU/EEA nationals), or Biometric Residence Permit (for non-UK residents). The document must be original (not a photocopy), valid (not expired), and contain a photograph and security features. Some providers may request a second document for address verification.

  • What are the steps to verify my identity online?

    To verify your identity online for UK qualified electronic signatures: (1) Choose a Qualified Trust Service Provider (QTSP) offering remote verification, (2) Upload or photograph your identity document (passport, driving licence), (3) Complete liveness detection (selfie video with prompted actions like blinking or smiling), (4) Wait for AI and/or human operator to validate your document and face match, (5) Receive your qualified certificate within minutes to 24 hours. Modern platforms like Yousign streamline this process with integrated workflows.

  • Is video identification as secure as face-to-face verification?

    Yes, when properly implemented with robust security measures, video identification can achieve equivalent security to face-to-face verification. Modern video ID systems include liveness detection (prevents spoofing with photos or pre-recorded videos), document authentication (AI analyses security features and cross-references with PRADO database), Presentation Attack Detection (PAD) (detects masks, deepfakes, face swaps), and ETSI TS 119 461 compliance (meets "attended remote" identity proofing requirements for high confidence level). Research shows 11 of 30 European Trust Service Providers use video identification as their primary method for qualified certificates.

  • How much does face-to-face identity verification cost?

    Costs vary depending on implementation approach: Professional services (notary, solicitor): £50-150 per verification; Own infrastructure: £15-50 per verification after £100,000+ initial setup for premises, equipment, staff; Remote video ID: €5-12 (£4-10) per verification with minimal initial investment; AI automated: €0.50-3 (£0.40-2.50) per verification at scale. Note: Face-to-face verification also incurs hidden costs from user abandonment (60-80% dropout rates), making the effective cost per completed signature much higher when accounting for wasted customer acquisition expenses.

  • Why is it important to prove my identity for electronic signatures?

    Proving your identity is essential for qualified electronic signatures because it establishes trust and legal validity. Under UK eIDAS regulations, QTSPs must verify that the person requesting a qualified certificate is who they claim to be before issuing signing credentials. This identity verification protects against fraud, ensures non-repudiation (signers cannot deny signing), meets regulatory requirements (AML/KYC compliance), and provides legal equivalence to handwritten signatures across UK and EU jurisdictions. Without proper identity proofing, electronic signatures lack the legal weight and security guarantees required for high-value transactions.

Discover Yousign's free electronic signature

Start your
free 14-day trial

Over 30,000 European companies already trust Yousign to sign and verify their documents. Join them today.

cta illustration