Example of validating communication backdating a computer
 Figure 1 illustrates an example system 100 for validating electronic communications;  Figure 2 illustrates an example implementation of a system 200 for validating electronic communications;  Figure 3 illustrates another example implementation of a system 300 for validating electronic communications;  Figure 4 illustrates another example implementation of a system 400 for validating electronic communications;  Figure 5 illustrates an example of process steps within a registration network 500 when being queried by a validation logic of a system for validating electronic communications;  Figure 6 illustrates an example method 600 for validating electronic communications;  Figure 7 illustrates an example method 700 for preparing a registration network; and  Figure 8 illustrates an example computer 800 that contains a retrieval logic 825 and validation logic 830.DETAILED DESCRIPTION  The following includes definitions of selected terms used throughout the disclosure.
BACKGROUND  Electronic communications, e-mail for example, have become a popular way of communicating.
Some of these systems and methods relate to "filtering" or "blocking" of e-mail.
In one example, an ISP may configure an e-mail server, or an individual may configure an electronic device for receiving electronic messages, to screen incoming messages for those originating from electronic addresses of known spammers.
Shading is not intended to suggest any particular characteristics or attributes.
It will be appreciated that changes, modifications and deviations from the embodiments illustrated in the drawings may be made without departing from the spirit and scope of the invention, as disclosed below.