Inheriti®
  • 👋Introduction to Inheriti®
  • 💁How it Works
  • ⚒️Requirements
  • 📚Glossary
  • Getting Started
    • 💻Editions
    • 🪪SafeID
    • 🛡️Protection Plans
      • Data Backup Plan
      • Digital Inheritance Plan
    • 🧩Plan Shares
    • 🧑Beneficiaries
    • ⏰Activation Methods
      • Plan Triggers
      • Dead Man Switches (DMS)
    • 🔑SafeKey
      • SafeKey Pro
      • SafeKey Mobile
    • ⛓️Blockchain
      • vechain
      • Ethereum
      • Optimism
    • 🗳️Inheriti® Vault
    • 💳Payment Methods
    • ✨Merging
  • User Guides
    • 🗃️Data Backup Plans
      • Create Backup
      • Merge Backup
    • ⚰️Digital Inheritance Plans
      • Create Inheritance
      • Merge Inheritance
  • Earn Utility Rewards
    • 🔮SHA Safe Nodes
    • 🤝Affiliate Program
  • Technical
    • 🕸️Secure Share Distribution Protocol (SSDP)
    • 🛡️Security Barometer
    • ✅Ownership Verification
    • 🪙SHA Token Utility
  • About
    • Company
    • Patents
    • Trademarks
    • Audits
    • Changelog
      • Inheriti® 2.0
        • Inheriti® 2.2
        • Inheriti® 2.1.2
        • Inheriti® 2.1.1
        • Inheriti® 2.1
      • Inheriti® 1.0
    • Merchandise
Powered by GitBook
On this page
  • How It Works
  • Features and Benefits
  • Use Cases
  1. Getting Started
  2. Activation Methods

Plan Triggers

Plan Triggers are manually activated by specific user actions.

Plan Triggers are integral to Data Backup Plans within Inheriti®, designed for situations that require explicit user actions and approval to access encrypted data securely.

How It Works

Plan Triggers are manually activated by specific user actions.

To access your data, you need to actively engage with the system by logging in, clicking on a designated link, or entering a unique code that you receive via phone call or SMS.

This manual approval ensures that the data is accessed intentionally and securely, following strict verification protocols.

Features and Benefits

Plan Triggers allow for a high degree of control over your data, enabling you to specify the precise conditions under which it can be accessed.

This customization makes the security setup highly adaptive to your needs, providing a robust security measure that aligns perfectly with your operational requirements.

While the setup demands some input, it ensures that every access to your data is deliberately approved and secure.

Use Cases

Ideal for users who need regular access to their data or wish to ensure that access to their digital backups is both secure and intentional.

This method is particularly useful for business data backups, where frequent access might be necessary, or for personal data that requires high security but needs to be readily accessible under controlled conditions.

PreviousActivation MethodsNextDead Man Switches (DMS)

Last updated 8 months ago

⏰