Introduction - If you have any usage issues, please Google them yourself
this procedure is the main principle in an encrypted authentication to achieve, of course, also include the encryption function, achieve relatively simple, as long as the encryption after the last several instruments up close can be.