BLOG

What is Pay-by-Face / Where Can It Be Used / How Does It Work?

What is Pay-by-Face / Where Can It Be Used / How Does It Work?

We work passionately to change the future with our young,

dynamic, and creative team

Reycan Çetin // Growth Manager @Techsign

Contactless payment systems became more and more popular after Covid 19 pandemic. Contactless payment systems provide great advantages for both healthcare and user experience. There are many contactless payment methods, and pay-by-face is one of the newest.

This new method is called pay-by-face or facial recognition payment. You can easily understand by just looking at the name, the system lets users make payments by introducing their faces. So the users don't need to carry cash, credit/debit card, or even cellphone. With these features, pay-by-face is a fast, easy, and secure payment system. It is secure, yet to get the payment the user's face must be recognized. And people can steal your id card, cellphone, or id card number, but not your face! Of course, your technology must be good enough to separate a photograph from a real person's face. We will talk about the technology below, how it works, what points should be considered, etc...

What are the use case scenarios for PBF?

Pay by face can be theoretically used instead of credit cards in all areas. Physical shops, online shopping, self-service food courts, taxis, public transportation, etc... In all these areas, users already pay with other contactless methods. For example, we pay through applications in taxis, we use QR codes in public transportation, and we pay through our smartwatch by using NFC. But all these transactions have something in common. They all depended on a device. If the smartwatch's battery dies or the credit card is forgotten, the user can not pay. Pay by face puts an end to all these problems. Because your face can not be stolen by someone else, and also can not be forgotten by you!

China uses PBF very actively, experiencing covid 19 horribly many habits had to change in China. One of them is the payment systems. China left to use cash in many areas. Different than Europe, many physical shops even don't accept cash, only mobile payments. Almost all physical shops provide a QR code payment option. But recently PBF is getting more and more popular. With the PBF option, users don't need to open their wallets, or even use their cell phones. It is really a good time saving for China's crowded cities.

Besides China, Russia uses PBF actively too. In 2021 Moscow Subway started to use Face Pay to provide passengers facial payment. It is the first time a public transportation system uses pay by face. Moscow Subway is one of the most crowded subways in the world, and authorities say that it saves a lot of time. PBF devices are on 240 stations, and the passengers use them voluntarily. They can still use passenger cards. If the passengers prefer to use PBF, they download the app and introduce their face and preferred card. That's all.

Advantages of Pay by Face

‍It is accepted that contactless payment systems are crucial for public health. Nowadays more and more sectors use contactless payments such as contactless credit cards, QR code payments, payment with NFC, etc... Pay by face offers many advantages when it was compared with other methods.

1. Unstealable, unforgettable, unlosable biometric features

‍As I mentioned before, the biggest advantage of PBF is being independent on any device. If someone steals your contactless credit card, the thief can use it before you beware and cancel the card. It is similar to QR code payment if someone steals your phone.

Being dependent on a device creates a problem when the user forgets the device too. Forgetting the card/cellphone/smartwatch is not a problem with PBF. It is secure and also provides a better user experience.

2. Time-saving

PBF saves a huge amount of time in busy places such as public transportation stations, self-service restaurants, big shops, etc...

You can watch the Moscow subway's face pay by clicking the link.

3. Identity verification with low error rates

‍Face recognition verifies identities with high technology. It can easily adapt the changes such as glasses, masks, make-up, etc...

4. Building customer locality programs

‍Managing the customer subscription system is easy with PBF. Customers don't need the enter their subscription number every time, and it will be easy to give awards to customers for brand loyalty. It is easy and practical.

Disadvantages of Pay by Face

‍PBF has no disadvantages technologically, but there is a huge obstacle in front of its spreading. The worries about the security of personal data. Users have concerns about their personal data being kept in the cloud. They think that malicious users can steal data and misuse them. This concern is mostly caused by a lack of knowledge. Users, I mean potential users, think that the system keeps the image of their whole face. And this image can be carried. But actually, face recognition technology develops by eliminating all these risks.

Learning about the technology will help to reduce these concerns. And I want to help, so I will explain the employed technology by selecting simple terms. But first, I want to talk about user experience.

The Steps of Pay-by-Face

‍User experiences differ a little bit across sectors. But there are two main steps: enrolling the face and using the face for the payment.

In the enrollment process, the users add their needed data which was shaped by the vendor, into the system. They can be email addresses, phone numbers, credit card numbers, etc... And then the users introduce their faces to be added to this newly created account. The system keeps the given data and also, the biometric features of the introduced face. In the payment step, the system recognizes the face and uses this recognized face's data to take payment‍

What kind of technology is employed in PBF?

‍Let's start with the most important question that users have in mind: "Can my facial image be transferred elsewhere?" Before diving into the details of the technology, let me answer that right away: NO! Actually, I don't think that it is a paranoid thought. Especially, when I think about the advancements in deepfake technology. This technology can manipulate images and videos by using a target person's face and voice. And it is a big threat. You are right to be concerned. But therefore, it is really crucial to understand how face recognition technology works and how it keeps personal information safe. I'll try to explain it very simply.

First of all, it's worth mentioning that I'm discussing this within the context of face payment systems, but the same principles apply to any facial recognition system.

In face recognitional payment systems, facial data is processed in two stages: during enrollment and during verification.

During the enrollment stage, when a user registers their face, the system creates and stores data based on biometric features. It doesn't store the entire image of the visage. But rather it creates numerical data which is derived from specific biometric features. These biometric features can be the distance between eyebrows, forehead width, cheekbone distance, etc... Only this numerical data is stored on the cloud, not the images of the face. So, even if someone steals these stored data, they can not create a complete face image by using these numeric data.

During the verification stage, the system compares the processed data from the user's biometric features with the stored data. The data being processed and compared are again numerical representations derived from biometric features.

Now, how does the system find the correct person from potentially thousands of registered users for payment? It does so through a mechanism called numerical categorization and indexing.

Let's think of it as searching for a specific book in a library. It is not exactly the same, but it operates on a similar principle. Imagine manually searching for a famous book about deepfake in a library without using any software. We will make choices to narrow our search area. Our book is written by a professional software engineer and has a lot of technical terms in it. So it is obviously not in the children's section. Let's exclude all children's books. Then we can eliminate novels and poetry sections. Step by step, we narrow down our search to non-fiction books. We exclude sports, history, and art books, focusing only on the computer science section. Instead of checking the names of all books in the library, we conduct a detailed search within the narrowed-down area.

Face recognition systems operate similarly. The system compares the numerical data obtained from the user's biometric features by narrowing down the search area. For example, let's assume that the first checked feature is the distance between the nose and chin, and the user's distance is 5 cm. The system excludes all data with distances above 5 cm. This action narrowed down the search area. And the next feature could be face width. If the user's face width is 11 cm, the system finds those with a distance of 5 cm and face width of 11 cm, discarding others. This way, the verification pool significantly narrows down after two or three feature comparisons. Let me remind you again, that these searches are performed based on numerical codes, not the images. And different companies may use different categorization systems. For instance, one company may use a 256-digit code, while another may use a 512-digit code. The representation of the same feature may vary in different digit positions across different coding schemes. Even if one company were to steal another company's data, it would be impossible to interpret and use the code elsewhere.

Let's return to our example. We had assumed that face width was the first feature checked, and it was defined in the 2nd and 3rd digits of a 512-digit code. When conducting the search, the system looks for the numbers that have 1 and 1 in the 2nd and 3rd digits. It keeps the matching numbers and excludes the others. After 2 or 3 searches the area became very small to find the right code. So the system can make the match in just a couple of seconds.


Pay-by-Face by Techsign

‍Facial recognition payment systems are really common in the Far East but not very well accepted in Europe or USA. And in Turkey, there is no local firm that provides this technology. Oh, there WAS no local firm! As Techsign, we are proud to announce that our Pay-by-face is ready to use! As a short notice, you can see PBF in chain stores, coffee shops, and many other places. Like in all our solutions, we used user-friendly and highly secured technologies in PBF. Our coding system has 512 digits to make it hard to crack it. And our liveness tests success rates are higher than 92%. That means no one can use your picture to make payments from your account.

To get to know better with this technology, please contact us.

SHARE

BLOG

Digital Signature Types

Not all digital signatures are the same. Learn the legal distinctions between electronic, advanced, and biometric signatures—and how Techsign’s compliant, white-label biometric solution simplifies secure, remote signing for modern businesses.

Reycan Çetin // Growth Manager @Techsign

Are Our Passwords Secure Enough? How Will Password Usage Change in the Future?

Weak passwords cause 30% of data breaches—and “123456” is still widely used. Learn why multi-factor and biometric authentication are the future, and how Techsign secures digital access with AI-powered, customizable identity solutions.

Barış Korkmaz

How Much Return Do KYC Solutions Provide? ROI Calculations

KYC & ID Verification solutions drive ROI by reducing costs, boosting productivity, and improving digital security. With Techsign’s AI-powered tools, businesses streamline customer onboarding, ensure compliance, and unlock new digital potential.

Mehmet Nuri Aybar // Senior Business Development Consultant

Incubation and Acceleration Programs That Can Help Startups

Incubators and accelerators guide startups from idea to growth, offering funding, mentorship, and more. Learn the key differences, top global programs, and Techsign’s own journey from early incubation to global acceleration success.

Reycan Çetin // Growth Manager @Techsign

Deepfake Threat in Identity Verification for Financial Systems

Deepfake tech is now a serious threat to financial systems, enabling fraudsters to bypass ID checks and liveness tests. Learn how attacks evolved—and how Techsign’s AI-powered security stays one step ahead of even the most advanced Deepfakes.

Reycan Çetin // Growth Manager @Techsign

What is Deepfake, why is it dangerous? How will we fight against the threats created by Deepfake?

Deepfake uses AI to alter real content—posing growing risks from identity fraud to political manipulation. Learn how it works, why the human eye fails to detect it, and how AI-driven defenses are our best hope to counter its evolving threats.

Osman S. Aktepe // Software Architect

Crypto Currencies, Security Problems, and Solutions

Crypto offers speed and flexibility—but also raises security concerns. Learn how Techsign’s AI-powered KYC tools, including face recognition and deepfake-resistant liveness checks, help crypto firms stay compliant and secure in a high-risk landscape.

Reycan Çetin // Growth Manager @Techsign

What is Pay-by-Face / Where Can It Be Used / How Does It Work?

Pay-by-face enables secure, fast, device-free payments using facial recognition. Learn how Techsign’s AI-driven system protects biometric data, prevents fraud, and reshapes user experience—without storing your actual face image.

Reycan Çetin // Growth Manager @Techsign

How Can Technology Help To Build Safer Micro Mobility Solutions?

Micro-mobility is rising—but safety and regulation must keep up. Discover how Techsign’s KYC tools like OCR, face recognition, and age verification can help cities and scooter firms create safer, smarter, and more inclusive transport systems.

Reycan Çetin // Growth Manager @Techsign

The Difference Between AML and KYC: Understanding Two Vital Components of Financial Security

AML and KYC are vital to financial security—while KYC verifies identity, AML prevents money laundering. Learn how Techsign’s AI-powered, legally compliant KYC solutions simplify remote onboarding with secure document and biometric verification.

Reycan Çetin // Growth Manager @Techsign

Should KYC Processes be Solved with Your Own Resources or Outsourced?

Should you build your own KYC system or work with a trusted provider? Discover the pros and cons of each path—and how Techsign’s expert solutions can reduce risk, save time, and ensure compliance in today’s fast-moving digital landscape.

Barış Korkmaz

How to Do KYC Verification? How Does KYC Work?

KYC is no longer just for banks—it's now vital in sectors from healthcare to gaming. As digital onboarding grows, AI-powered KYC ensures secure, compliant, and seamless user experiences across industries. Discover where it’s heading next.

Reycan Çetin // Growth Manager @Techsign

Identity Verification Methods - 5 Different Methods

Biometric authentication is rising—but no method is flawless alone. Learn why multi-factor authentication is essential, how each method compares, and how Techsign combines AI-powered biometrics with layered security for reliable identity verification.

AI Agents in Remote Know Your Customer

Video calls once secured remote onboarding—but deepfakes and high costs changed the game. Discover how Techsign’s AI agents offer faster, safer, and more scalable identity verification, detecting fraud beyond what the human eye can catch.

Reycan Çetin // Growth Manager @Techsign

Confusing Deepfake Examples from 2023 and 2024

From fake Elon Musk speeches to Tom Cruise TikToks, deepfakes are more realistic—and risky—than ever. Explore recent examples, the dangers they pose, and how tools like Techsign’s Fake Finder help uncover what’s real and what’s not.

Reycan Çetin // Growth Manager @Techsign

Quantum-Resistant Cryptography in Identity Verification

Quantum computing could break today’s encryption—but quantum-resistant cryptography offers hope. Explore why securing digital identities now is key, and how the tech world is preparing for a future where quantum threats are real.

Serkan Fergan

Differences Between Cheapfake and Deepfake and the Threats They Pose in Identity Fraud

Cheapfakes and deepfakes both threaten identity systems—but in different ways. Learn the key differences, how each is used in fraud, and why Techsign’s AI-powered liveness detection and multi-factor tools are essential for digital security.

Reycan Çetin // Growth Manager @Techsign

Fraud as a Service (FaaS): Committing Fraud Has Never Been This Easy!

Fraud is now a service—sold with tools, support, and guides to anyone online. Learn how FaaS is reshaping cybercrime and how Techsign’s AI-powered, risk-based authentication helps businesses stay protected in this new era of digital fraud.

Reycan Çetin // Growth Manager @Techsign

Deepfake Scams: A New Threat in the Digital World

Deepfake scams are on the rise—from romance fraud to KYC bypass attempts. Learn how scammers exploit AI to deceive individuals and institutions, and how Techsign’s detection tools help uncover fake content before it’s too late.

Reycan Çetin // Growth Manager @Techsign

We can find the solution you need together.

Contact us to find suitable solutions for your company that are shaped by your sector, scale, and geographic region.

Let's connnect to find the solution
you need together!

Teknopark No:1/1C, Office: 1301 34906
İstanbul/Türkiye


t. +90 (216) 510 2761

m. info@techsign.com

Copyright 2025 © Techsign

We can find the solution you need together.

Contact us to find suitable solutions for your company that are shaped by your sector, scale, and geographic region.

Let's connnect to find the solution
you need together!

Teknopark No:1/1C, Office: 1301 34906
İstanbul/Türkiye


t. +90 (216) 510 2761

m. info@techsign.com

Copyright 2025 © Techsign

We can find the solution you need together.

Contact us to find suitable solutions for your company that are shaped by your sector, scale, and geographic region.

Let's connnect to find the solution
you need together!

Teknopark No:1/1C, Office: 1301 34906
İstanbul/Türkiye


t. +90 (216) 510 2761

m. info@techsign.com

Copyright 2025 © Techsign