Solved

Urgent, hash verification posted from another site if ok then do the query

Posted on 2004-09-09
1
141 Views
Last Modified: 2013-12-24
I have an online processor, that for whatever reason allows the buyer to see the complete url (which includes the total amount to be paied) and the user can edit this information and the processor will allow him to pay it. The only security they provide is sending me back a hashed key, which i will verify aganist the information i sent them.

Now, here is what i want to do,
First, after the customer is done with selecting what he needs, he will be directed to the payment processor. he pays then he will be redirected to my web site, if his transaction is accpeted (verifyied against the hased key) the information of the transaction he made will be entered into my db and an e-mail will be sent to him and to me.

the e-mail thing (do not worry about it, it is very easy)
first problem, how will i store his information, since the information he entered into the form (i'm trying not to store it until i get the confirmation) will be lost! so where should i store this information and how.

second, how to accept the parameters passed back from the processor, they will send me the parameters as hidden form fields?

third, well if i know how to accept the parameters i can run a check against the hashed key they send to me.

I'm running out of time, so urgent help is needed (and be some how detailed)
Thanks,
0
Comment
Question by:MMsabry
1 Comment
 
LVL 21

Accepted Solution

by:
pinaldave earned 500 total points
Comment Utility
Hi MMsabry,
 first problem, how will i store his information, since the information
 he entered into the form (i'm trying not to store it until i get the
 confirmation) will be lost! so where should i store this information and how.

    session variables

 
 second, how to accept the parameters passed back from the processor,
 they will send me the parameters as hidden form fields?

    you can access them as form.variablename may be you need pound around them...
 
 third, well if i know how to accept the parameters i can run a check
 against the hashed key they send to me.

    I guess
 
 I'm running out of time, so urgent help is needed (and be some how detailed)
 Thanks,

    what you want to know more?? :)


Regards,
---Pinal
0

Featured Post

IT, Stop Being Called Into Every Meeting

Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

Join & Write a Comment

This is a guide to setting up a new WHM/cPanel Server to be used for web hosting accounts. It is intended for web hosting company administrators and dedicated server owners. For under $99 per month (considering normal rate of Big Data Cetnters like …
Periodically we have to update or add SSL certificates for customers. Depending upon your hosting plan you may be responsible for the installation and/or key generation. In the wake of Heartbleed many sites were forced to re-key. We will concen…
This tutorial demonstrates a quick way of adding group price to multiple Magento products.
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

771 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now