Information technology — Security techniques — Identity proofing