Activation Methods

Inheriti® employs several activation methods as an extra security layer for controlled opening of protection plans.

Inheriti® is equipped with sophisticated activation methods designed to safeguard your protection plans by controlling the precise conditions under which they can be opened.

These methods ensure a high level of security and personal control over your protection plans.

Types of Activation Methods

Plan Trigger (for Backup Plans)

Employed in Data Backup Plans, Plan Triggers require explicit actions to authorize access to the data.

These are customizable and can be set to respond to various secure actions, providing flexibility and control over data accessibility.

Dead Man Switch (DMS) (for Inheritance Plans)

Used in Digital Inheritance Plans, this method helps ensure that assets are transferred only under specific conditions, typically related to the plan owner's inability to manage their affairs.

It serves as a crucial safety mechanism, activating automatically under predefined conditions.

Both types of activation methods are designed with your security in mind, allowing you to tailor your protection plans according to your specific needs and circumstances.

Plan TriggerDead Man Switch

Purpose

Requires explicit actions and approval to access data.

Ensures asset transfer under specific, passive/non-responsive conditions.

Use Case

Best for data backup plans needing controlled access at specific times.

Ideal for digital inheritance plans where asset transfer is intended after the user's incapacitation or death.

Activation

Manually triggered by specific user actions such as entering a code or clicking a link.

Automatically triggered based on non-action within a set timeframe.

Security

High. Allows users to maintain tight control over when data is accessed.

High. Provides robust protection ensuring assets are only accessed when truly necessary.

Ease of implementation

Requires setup of specific actions which must be followed precisely for access.

Simple to set up with minimal action required once conditions are set.

Overview of Activation Methods

Login

Requires users to authenticate by logging into their account to approve or abort the merging process.

Users must click a link sent via email or other secure means to approve or abort the merging process.

Phone Call

Involves receiving a phone call where a unique code is provided. The user must enter this code to either approve or abort the merging process, ensuring a higher level of verification.

SMS

Similar to the phone call, a unique code is sent via SMS which the user must enter to approve or abort the merging process.

Last updated