Introduction - If you have any usage issues, please Google them yourself
The use of user name and password information as contact information for the encryption key to prevent users to delete a user name and password to access key contact information: user name, password, store the time each time you open contact information will be read into the data structure operation data structure can be operated only from time to time saved to the file will be closed each time contact information onto encrypted document