Inheriti®
  • 👋Introduction to Inheriti®
  • 💁How it Works
  • ⚒️Requirements
  • 📚Glossary
  • Getting Started
    • 💻Editions
    • 🪪SafeID
    • 🛡️Protection Plans
      • Data Backup Plan
      • Digital Inheritance Plan
    • 🧩Plan Shares
    • 🧑Beneficiaries
    • ⏰Activation Methods
      • Plan Triggers
      • Dead Man Switches (DMS)
    • 🔑SafeKey
      • SafeKey Pro
      • SafeKey Mobile
    • ⛓️Blockchain
      • vechain
      • Ethereum
      • Optimism
    • 🗳️Inheriti® Vault
    • 💳Payment Methods
    • ✨Merging
  • User Guides
    • 🗃️Data Backup Plans
      • Create Backup
      • Merge Backup
    • ⚰️Digital Inheritance Plans
      • Create Inheritance
      • Merge Inheritance
  • Earn Utility Rewards
    • 🔮SHA Safe Nodes
    • 🤝Affiliate Program
  • Technical
    • 🕸️Secure Share Distribution Protocol (SSDP)
    • 🛡️Security Barometer
    • ✅Ownership Verification
    • 🪙SHA Token Utility
  • About
    • Company
    • Patents
    • Trademarks
    • Audits
    • Changelog
      • Inheriti® 2.0
        • Inheriti® 2.2
        • Inheriti® 2.1.2
        • Inheriti® 2.1.1
        • Inheriti® 2.1
      • Inheriti® 1.0
    • Merchandise
Powered by GitBook
On this page
  • Types of Activation Methods
  • Plan Trigger (for Backup Plans)
  • Dead Man Switch (DMS) (for Inheritance Plans)
  • Overview of Activation Methods
  • Login
  • Click on Link
  • Phone Call
  • SMS
  1. Getting Started

Activation Methods

Inheriti® employs several activation methods as an extra security layer for controlled opening of protection plans.

PreviousBeneficiariesNextPlan Triggers

Last updated 1 year ago

Inheriti® is equipped with sophisticated activation methods designed to safeguard your protection plans by controlling the precise conditions under which they can be opened.

These methods ensure a high level of security and personal control over your protection plans.

Types of Activation Methods

Plan Trigger (for Backup Plans)

Employed in , Plan Triggers require explicit actions to authorize access to the data.

These are customizable and can be set to respond to various secure actions, providing flexibility and control over data accessibility.

Dead Man Switch (DMS) (for Inheritance Plans)

Used in , this method helps ensure that assets are transferred only under specific conditions, typically related to the plan owner's inability to manage their affairs.

It serves as a crucial safety mechanism, activating automatically under predefined conditions.

Both types of activation methods are designed with your security in mind, allowing you to tailor your protection plans according to your specific needs and circumstances.

Plan Trigger
Dead Man Switch

Purpose

Requires explicit actions and approval to access data.

Ensures asset transfer under specific, passive/non-responsive conditions.

Use Case

Best for data backup plans needing controlled access at specific times.

Ideal for digital inheritance plans where asset transfer is intended after the user's incapacitation or death.

Activation

Manually triggered by specific user actions such as entering a code or clicking a link.

Automatically triggered based on non-action within a set timeframe.

Security

High. Allows users to maintain tight control over when data is accessed.

High. Provides robust protection ensuring assets are only accessed when truly necessary.

Ease of implementation

Requires setup of specific actions which must be followed precisely for access.

Simple to set up with minimal action required once conditions are set.

Overview of Activation Methods

Login

Requires users to authenticate by logging into their account to approve or abort the merging process.

Click on Link

Users must click a link sent via email or other secure means to approve or abort the merging process.

Phone Call

Involves receiving a phone call where a unique code is provided. The user must enter this code to either approve or abort the merging process, ensuring a higher level of verification.

SMS

Similar to the phone call, a unique code is sent via SMS which the user must enter to approve or abort the merging process.

⏰
Data Backup Plans
Digital Inheritance Plans