If it is successfully verified, the browser will generate two symmetric keys and send one of them to the web server, encrypted by the public key. When the server receives it, it will decrypt it using its private key. To safely transfer data, the browser and server can now establish an encrypted connection.