These systems all attempt to provide identity authentication, for example, by guaranteeing that an IP address or domain name attempting to transmit the email message, web page, or other data is the actual IP address or domain purporting to transmit the data, and not a spoofed IP address or domain name.