Solved

Urgent, hash verification posted from another site if ok then do the query

Posted on 2004-09-09
1
146 Views
Last Modified: 2013-12-24
I have an online processor, that for whatever reason allows the buyer to see the complete url (which includes the total amount to be paied) and the user can edit this information and the processor will allow him to pay it. The only security they provide is sending me back a hashed key, which i will verify aganist the information i sent them.

Now, here is what i want to do,
First, after the customer is done with selecting what he needs, he will be directed to the payment processor. he pays then he will be redirected to my web site, if his transaction is accpeted (verifyied against the hased key) the information of the transaction he made will be entered into my db and an e-mail will be sent to him and to me.

the e-mail thing (do not worry about it, it is very easy)
first problem, how will i store his information, since the information he entered into the form (i'm trying not to store it until i get the confirmation) will be lost! so where should i store this information and how.

second, how to accept the parameters passed back from the processor, they will send me the parameters as hidden form fields?

third, well if i know how to accept the parameters i can run a check against the hashed key they send to me.

I'm running out of time, so urgent help is needed (and be some how detailed)
Thanks,
0
Comment
Question by:MMsabry
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 21

Accepted Solution

by:
pinaldave earned 500 total points
ID: 12019025
Hi MMsabry,
 first problem, how will i store his information, since the information
 he entered into the form (i'm trying not to store it until i get the
 confirmation) will be lost! so where should i store this information and how.

    session variables

 
 second, how to accept the parameters passed back from the processor,
 they will send me the parameters as hidden form fields?

    you can access them as form.variablename may be you need pound around them...
 
 third, well if i know how to accept the parameters i can run a check
 against the hashed key they send to me.

    I guess
 
 I'm running out of time, so urgent help is needed (and be some how detailed)
 Thanks,

    what you want to know more?? :)


Regards,
---Pinal
0

Featured Post

How Do You Stack Up Against Your Peers?

With today’s modern enterprise so dependent on digital infrastructures, the impact of major incidents has increased dramatically. Grab the report now to gain insight into how your organization ranks against your peers and learn best-in-class strategies to resolve incidents.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Periodically we have to update or add SSL certificates for customers. Depending upon your hosting plan you may be responsible for the installation and/or key generation. In the wake of Heartbleed many sites were forced to re-key. We will concen…
If you don't have the right permissions set for your WordPress location in IIS, you won't be able to perform automatic updates. Here's how to fix the problem.
Exchange organizations may use the Journaling Agent of the Transport Service to archive messages going through Exchange. However, if the Transport Service is integrated with some email content management application (such as an antispam), the admini…
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

734 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question