One more successful technique is the use of online verification of protection information towards a central database. In many situations, online verification can detect very simple copying of the document by detecting tried use in multiple spots simultaneously, or entirely Phony IDs, as the information about the ID will be uncovered to get invalid.