<s>
The	O
Offline	B-Protocol
Private	I-Protocol
Key	I-Protocol
Protocol	I-Protocol
(	O
OPKP	O
)	O
is	O
a	O
cryptographic	B-Protocol
protocol	I-Protocol
to	O
prevent	O
unauthorized	O
access	O
to	O
back	B-Protocol
up	I-Protocol
or	O
archive	B-Application
data	O
.	O
</s>
<s>
The	O
protocol	O
results	O
in	O
a	O
public	B-Application
key	I-Application
that	O
can	O
be	O
used	O
to	O
encrypt	O
data	O
and	O
an	O
offline	O
private	B-Application
key	I-Application
that	O
can	O
later	O
be	O
used	O
to	O
decrypt	O
that	O
data	O
.	O
</s>
<s>
An	O
offline	O
private	B-Application
key	I-Application
should	O
:	O
</s>
<s>
To	O
comply	O
with	O
these	O
rules	O
,	O
the	O
offline	B-Protocol
private	I-Protocol
key	I-Protocol
protocol	I-Protocol
uses	O
a	O
method	O
of	O
asymmetric	B-Application
key	I-Application
wrapping	O
.	O
</s>
<s>
When	O
archiving	O
or	O
creating	O
a	O
backup	B-Protocol
,	O
for	O
each	O
session	O
or	O
file	O
:	O
</s>
