This uses a challenge/response mechanism based in public key cryptography and any digital signatures. It provides proof that the document is not copied and refers to the correct IC.