Abstract:
Systems and methods for use in authenticating business partners, in connection with requests by the partners for various products and/or services, are disclosed. An exemplary method generally includes receiving a request from a business partner for a product and/or a service where the product and/or service relates, for example, at least partly, to transaction data, or other data. The method also generally includes assigning a risk score to the business partner, comparing the risk score assigned to the business partner to a sensitivity threshold associated with the requested product and/or service, and distributing the product and/or service to the business partner, when the risk score satisfies the sensitivity threshold.