Solved

Urgent, hash verification posted from another site if ok then do the query

Posted on 2004-09-09
1
143 Views
Last Modified: 2013-12-24
I have an online processor, that for whatever reason allows the buyer to see the complete url (which includes the total amount to be paied) and the user can edit this information and the processor will allow him to pay it. The only security they provide is sending me back a hashed key, which i will verify aganist the information i sent them.

Now, here is what i want to do,
First, after the customer is done with selecting what he needs, he will be directed to the payment processor. he pays then he will be redirected to my web site, if his transaction is accpeted (verifyied against the hased key) the information of the transaction he made will be entered into my db and an e-mail will be sent to him and to me.

the e-mail thing (do not worry about it, it is very easy)
first problem, how will i store his information, since the information he entered into the form (i'm trying not to store it until i get the confirmation) will be lost! so where should i store this information and how.

second, how to accept the parameters passed back from the processor, they will send me the parameters as hidden form fields?

third, well if i know how to accept the parameters i can run a check against the hashed key they send to me.

I'm running out of time, so urgent help is needed (and be some how detailed)
Thanks,
0
Comment
Question by:MMsabry
1 Comment
 
LVL 21

Accepted Solution

by:
pinaldave earned 500 total points
ID: 12019025
Hi MMsabry,
 first problem, how will i store his information, since the information
 he entered into the form (i'm trying not to store it until i get the
 confirmation) will be lost! so where should i store this information and how.

    session variables

 
 second, how to accept the parameters passed back from the processor,
 they will send me the parameters as hidden form fields?

    you can access them as form.variablename may be you need pound around them...
 
 third, well if i know how to accept the parameters i can run a check
 against the hashed key they send to me.

    I guess
 
 I'm running out of time, so urgent help is needed (and be some how detailed)
 Thanks,

    what you want to know more?? :)


Regards,
---Pinal
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Most ColdFusion developers get confused between the CFSet, Duplicate, and Structcopy methods of copying a Structure, especially which one to use when. This Article will explain the differences in the approaches with examples; therefore, after readin…
If you don't have the right permissions set for your WordPress location in IIS, you won't be able to perform automatic updates. Here's how to fix the problem.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

785 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question