Inheriti®
  • 👋Introduction to Inheriti®
  • 💁How it Works
  • ⚒️Requirements
  • 📚Glossary
  • Getting Started
    • 💻Editions
    • 🪪SafeID
    • 🛡️Protection Plans
      • Data Backup Plan
      • Digital Inheritance Plan
    • 🧩Plan Shares
    • 🧑Beneficiaries
    • ⏰Activation Methods
      • Plan Triggers
      • Dead Man Switches (DMS)
    • 🔑SafeKey
      • SafeKey Pro
      • SafeKey Mobile
    • ⛓️Blockchain
      • vechain
      • Ethereum
      • Optimism
    • 🗳️Inheriti® Vault
    • 💳Payment Methods
    • ✨Merging
  • User Guides
    • 🗃️Data Backup Plans
      • Create Backup
      • Merge Backup
    • ⚰️Digital Inheritance Plans
      • Create Inheritance
      • Merge Inheritance
  • Earn Utility Rewards
    • 🔮SHA Safe Nodes
    • 🤝Affiliate Program
  • Technical
    • 🕸️Secure Share Distribution Protocol (SSDP)
    • 🛡️Security Barometer
    • ✅Ownership Verification
    • 🪙SHA Token Utility
  • About
    • Company
    • Patents
    • Trademarks
    • Audits
    • Changelog
      • Inheriti® 2.0
        • Inheriti® 2.2
        • Inheriti® 2.1.2
        • Inheriti® 2.1.1
        • Inheriti® 2.1
      • Inheriti® 1.0
    • Merchandise
Powered by GitBook
On this page
  • Step 1: Plan Your Protection
  • Step 2: Encrypt and Split
  • Step 3: Distribute Securely
  • Step 4: Merge When Needed

How it Works

Decentralization might seem difficult, but Inheriti® simplifies it, delivering unparalleled security, efficiency and affordability.

PreviousIntroduction to Inheriti®NextRequirements

Last updated 1 year ago

Now that you had and know what it is and who it's for, let’s dive into how it will help you to secure and protect your sensitive data.

Our process is straightforward but powerful, ensuring your peace of mind every step of the way.

Step 1: Plan Your Protection

This isn't just any plan, but it's customized to fit your specific needs. Whether you're securing your crypto keys, passwords, business secrets or safeguarding family memories,

Inheriti® tailors your plan to ensure complete security:

  • Decide who your trusted beneficiaries are.

  • Choose where your data will be stored, from blockchain to physical devices and mobile phones.

Your data’s safety begins in your browser and stays intact throughout its journey.

Step 2: Encrypt and Split

Next, we take your data and fortify it. Using sophisticated encryption algorithms like AES-256 and Shamir’s Secret Sharing, your data is split into separate, secure pieces.

This means even if someone were to access a piece, they couldn't reconstruct your data without the other parts. It’s security that adapts to your needs, keeping your information intact and impenetrable.

Step 3: Distribute Securely

Your encrypted data isn’t just stored somewhere centralized. It’s strategically distributed across various secure locations:

This diversified multilayer storage approach ensures that there’s no single point of failure, enhancing the resilience of your data security.

Step 4: Merge When Needed

Inheriti®'s Commitment to Security At Inheriti®, security isn’t just a feature, it's embedded in every layer of our process. From the initial plan configuration to the final data retrieval, every step is designed to protect and empower you, your data, and your beneficiaries. Our innovative technology not only secures your digital assets but also ensures they are managed exactly as you wish, without compromise.

It all starts with setting up your .

Select how your data should be accessed using our advanced .

Immutably on the for transparency and security.

In the cloud via for accessibility.

Via devices like for offline security.

Or directly on your mobile phone with e for convenience.

When the time is right, whether it’s a planned transfer or an unexpected necessity, your —or you, for your own backup plans — can securely retrieve the data via .

By combining the using the predefined conditions of the , the data is reconstructed safely and accurately, just as intended.

💁
protection plan
activation methods
blockchain
Inheriti® Vault
SafeKey Pro
SafeKey Mobil
beneficiaries
the merging process
encrypted plan shares
activation methods
a first introduction to Inheriti®