How Does Inheriti® Work?
Under the hood

How Does Inheriti® Work?

Decentralization might seem difficult, but Inheriti® simplifies it, delivering unparalleled security, efficiency and affordability.
Sign up Product overview

Secure Share Distribution Protocol (SSDP)

Inheriti® simplifies data protection through our innovative and patented Secure Share Distribution Protocol (SSDP). Here’s how it works.

1. Plan Configuration

Start by creating a data protection plan with Inheriti®.

2. Split and Encrypt

Your data is then split into shares and encrypted via different algorithms and protocols.

3. Share Distribution

Encrypted shares are distributed across different secure locations or devices, ensuring no central point of failure. 

4. Data Reveal

When the time comes, and through a multi-layered verification, beneficiaries can combine their encrypted shares to reveal the secret data securely.

Step 1

Configure Your Protection Plan

Get started by setting up your customized protection plan. Whether it’s for securing important data or ensuring a smooth inheritance process, just fill in the plan details like:

  • Your trusted beneficiaries
  • Storage layers
  • Preferred blockchain
  • Activation methods

Your data is always prioritized for security, and will never leave your browser.

Sign up Product overview
Configure Your Protection Plan
Step 2

Split Data into Multiple Encrypted Shares

Following the plan setup, your data is first split into separate shares using the Shamir’s Secret Sharing Scheme (SSS). Immediately after splitting, each share is encrypted using the AES-256 algorithm. This dual-step process ensures that each share is independently secure and incomplete on its own, enhancing the data’s overall security.

Sign up Product overview
Split Data into Multiple Encrypted Shares
Step 3

Distribute Shares Across Multiple Layers

Utilizing our SSDP, the encrypted shares are distributed across various storage layers and devices, such as:

  • Blockchain
  • Cloud
  • Cold storage
  • Mobile storage

Beneficiaries receive their shares securely and transparently. They can choose to store their shares using SafeKey Pro, a secure cold storage device, or SafeKey Mobile, directly on their mobile phone.

Sign up Product overview
Distribute Shares Across Multiple Layers
Step 4

Merge The Encrypted Shares to Decrypt The Secret Data

Accessing your data is seamless. After the merge authority initiates the merging process, beneficiaries need to present their shares, activating methods like the Dead Man Switch or Plan Triggers. Your data reconstructs effortlessly when the shares are combined, ensuring access without compromising security and trust.

Sign up Product overview
Merge The Encrypted Shares to Decrypt The Secret Data
Additional security layers

Plan Triggers and Dead Man Switches

Inheriti® provides additional security layers to enhance data protection, including Plan Triggers and Dead Man Switches:

  • Dead Man Switch: Utilized in inheritance plans, the Dead Man Switch serves as a verification mechanism to confirm the status of the plan owner. If a required action is not taken before the configured timer hits zero, the Dead Man Switch is triggered. This ensures secure data management, even in the absence of the plan owner. For instance, it can approve merging by default if the plan owner is deceased.
  • Plan Trigger: Deployed in backup plans, the Plan Trigger serves as a security feature to verify the owner’s agreement for the data to be opened. If a required action is taken before the configured timer hits zero, the Plan Trigger is activated. This mechanism ensures that data access is only granted with the explicit approval of the plan owner. For example, it can approve merging when the plan owner takes action to authorize it.
Sign up Product overview
Plan Triggers and Dead Man Switches
Security and privacy

Inheriti® Offers The Highest Security and Privacy For Your Data by Design

Dive into the core of Inheriti®’s architecture, where every layer is built with your security and privacy in mind. From advanced encryption protocols to comprehensive audits, discover how we ensure that your digital assets and personal information are protected with unparalleled diligence, providing you with peace of mind in a digital world.

Sign up Security and Privacy

Common Questions

This section aims to address frequently asked questions about how Inheriti® ensures the security and accessibility of your digital assets through our four-step process: Plan Configuration, Split and Encrypt, Distribute, and Merge and Retrieve.

Step 1

Plan Configuration

Plan how to secure your digital assets.

Sensitive information such as passwords, private keys, seed phrases, social media accounts, credit cards, and much more. Whether it's personal or business-related, Inheriti® ensures that your valuable data remains secure and accessible.

You can designate any trusted individuals as beneficiaries to receive specific shares of your data for future access.
Step 2

Split and Encrypt

Enhancing security through encryption and data fragmentation.

Data is encrypted using AES-256, a robust standard ensuring the highest level of security.

No, Inheriti® cannot access your encrypted data. All encryption occurs on your device, safeguarding your privacy.

Data is split using the Shamir’s Secret Sharing Scheme, creating secure shares that individually reveal nothing about the original data.

Yes, each share is individually encrypted and secure, providing no usable data on its own.

Your data is split into multiple shares depending on your configuration. Each beneficiary receives their shares, and additional validator and backup shares are stored on the blockchain.
Step 3

Distribute

Securely distributing encrypted data shares.

Shares are distributed across selected blockchains (like vechain, Ethereum, and Optimism), databases, cloud storage, and optionally through SafeKey Mobile or SafeKey Pro devices.

Shares are distributed using encrypted channels and stored in secure environments, maintaining their confidentiality and integrity.

While specific storage layers like databases and cloud storage are standardized, you can choose your preferred blockchain and assign SafeKey devices to beneficiaries.

By spreading data across multiple locations, the risk of total data compromise is minimized and there's not a single point-of-failure.

Backup shares stored on the blockchain can be utilized, and not all shares may be needed if the threshold for merging is set lower and sufficient shares are available.
Step 4

Merge and Retrieve

Reconstructing data when necessary.

 

Merging involves gathering the necessary number of shares and using them to decrypt and reconstruct the data. This merging process can be initiated by the Merge Authority.

Retrieval conditions may include activating a Dead Man Switch or Plan Trigger, depending on whether it's an inheritance or a backup plan.

Data retrieval is prompt once all activation methods are active and the required shares are presented.

The minimum number of shares required for retrieval depends on the initial configuration, aligning with your chosen security threshold.

Start Planning for Tomorrow, Today.

From precious memories to crucial data and assets, Inheriti® offers both digital inheritance solutions and decentralized data backups. Ensuring your legacy and sensitive data are protected for generations to come.

Sign up