Solved

Urgent, hash verification posted from another site if ok then do the query

Posted on 2004-09-09
1
145 Views
Last Modified: 2013-12-24
I have an online processor, that for whatever reason allows the buyer to see the complete url (which includes the total amount to be paied) and the user can edit this information and the processor will allow him to pay it. The only security they provide is sending me back a hashed key, which i will verify aganist the information i sent them.

Now, here is what i want to do,
First, after the customer is done with selecting what he needs, he will be directed to the payment processor. he pays then he will be redirected to my web site, if his transaction is accpeted (verifyied against the hased key) the information of the transaction he made will be entered into my db and an e-mail will be sent to him and to me.

the e-mail thing (do not worry about it, it is very easy)
first problem, how will i store his information, since the information he entered into the form (i'm trying not to store it until i get the confirmation) will be lost! so where should i store this information and how.

second, how to accept the parameters passed back from the processor, they will send me the parameters as hidden form fields?

third, well if i know how to accept the parameters i can run a check against the hashed key they send to me.

I'm running out of time, so urgent help is needed (and be some how detailed)
Thanks,
0
Comment
Question by:MMsabry
1 Comment
 
LVL 21

Accepted Solution

by:
pinaldave earned 500 total points
ID: 12019025
Hi MMsabry,
 first problem, how will i store his information, since the information
 he entered into the form (i'm trying not to store it until i get the
 confirmation) will be lost! so where should i store this information and how.

    session variables

 
 second, how to accept the parameters passed back from the processor,
 they will send me the parameters as hidden form fields?

    you can access them as form.variablename may be you need pound around them...
 
 third, well if i know how to accept the parameters i can run a check
 against the hashed key they send to me.

    I guess
 
 I'm running out of time, so urgent help is needed (and be some how detailed)
 Thanks,

    what you want to know more?? :)


Regards,
---Pinal
0

Featured Post

Building an interactive eFuture classroom

Watch and learn how ATEN provided a total control system solution including seamless switching matrix switch, HDBaseT extenders, PDU, lighting control to build an interactive eFuture classroom.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
iis reverse proxy virtual directory 8 234
how to generate a csr to request an intermediate ca on os x 3 64
Script 12 191
move expression web site to a new server 13 72
Have you ever sent email via ColdFusion and thought of tracking this mail to capture the exact date and time when the message was opened ?  If yes, then this article is for you ! First we need a table user_email with columns user_id , email , sub…
Most ColdFusion developers get confused between the CFSet, Duplicate, and Structcopy methods of copying a Structure, especially which one to use when. This Article will explain the differences in the approaches with examples; therefore, after readin…
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

685 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question