One more successful approach is the usage of online verification of security facts against a central database. In lots of conditions, online verification can detect very simple copying of the doc by detecting attempted use in multiple sites at the same time, or completely copyright, as the information around the ID will probably be identified to ge