Inheriti® 2.0
Product overview

Inheriti® 2.0

Our mission is to empower individuals and companies to protect, manage and transfer their digital assets, ensuring that every byte of their digital life is preserved and shared with the right hands at the right time.
Sign up Learn more
Protection Plans

Enhance Your Data Security

A Protection Plan refers to a secure and decentralized method for users to safeguard their data in an encrypted manner.

  • Backup Plans: A protection plan that enables users to create decentralized backups of their digital data. It allows for the storage and protection of various types of information, similar to a Digital Inheritance Plan. The plan owner has the option to be a shareholder and can determine additional shareholders. The plan is activated through the Plan Trigger method, ensuring data security and accessibility.
  • Inheritance Plans: A protection plan designed for the inheritance of digital data. It allows the plan owner to designate heirs and a Merge Authority while utilizing the Dead Man Switch activation method to ensure secure transfer of assets.
Sign up
Enhance Your Data Security
Beneficiaries

Define Access and Rights

Beneficiary is an overarching term used to refer to all individuals who hold shares of a protection plan. It encompasses Shareholders, Heirs, and other designated individuals who are entitled to receive the benefits or assets specified in the plan.

  • Shareholders: A shareholder is a specific type of beneficiary designated to have a share in the encrypted data backup within a backup plan.
  • Heirs: An heir is a beneficiary designated to inherit digital assets within an inheritance plan.
  • Merge Authority: The Merge Authority is a Beneficiary responsible for initiating the merging process within a Protection Plan.
Sign up
Define Access and Rights

Plan Share Distribution

Plan shares are created for each beneficiary in pairs. These shares contain encrypted and split portions of the secret data. Each beneficiary receives at least two plan shares, allowing them to collectively access and recover the protected data.

  • Plan Shares: Plan shares are distributed to the assigned SafeKey Pro or SafeKey Mobile of each beneficiary.
  • Validator Share: This share remains securely stored until all specified Activation Methods are triggered. It is only released when the plan owner is confirmed deceased or has no objections to opening the protection plan. The validator share adds an additional layer of security and ensures proper authorization before accessing the protected data.
  • Recovery Shares: Recovery shares are optional and can be added based on the number of shareholders involved. Like plan shares, recovery shares are created in pairs. They serve as a contingency measure in case a beneficiary loses their plan shares. Recovery shares are stored alongside the validator share in the same Inheriti® Smart Contract, providing an additional option for data recovery.
Sign up
Plan Share Distribution
Activation Methods

Additional Security Layer for Peace of Mind

Activation Method is the overarching term used to describe the methods employed within protection plans to initiate specific actions or events. It encompasses the Dead Man Switch and Plan Trigger, which are two common activation methods utilized in different types of plans.

Plan Trigger

The Plan Trigger is an activation method employed in various protection plans, particularly in backup plans. It acts as a security feature to verify the owner’s agreement for the data to be opened.

Learn more

Dead Man Switch

The Dead Man Switch is an activation method used in certain protection plans, particularly in inheritance plans. It serves as a verification mechanism to confirm the status of the plan owner and gets triggered if a required action is not taken before the configured timer hit 0.

Learn more
Distributed Storage Layers

Advanced Security and Enhanced Decentralization with An Innovative Multi-Layer Topology

Our unique decentralized storage mechanism ensures that your data isn’t just encrypted and fragmented, but it’s also stored across multiple layers, making unauthorized access exponentially harder. Instead of placing all your valuables in a single safe, it’s like distributing them across multiple safes, each with its own security protocols.

SafeKey Pro

SafeKey Pro has been designed with custom internal storage. This allows you to cold store encrypted shares of your protection plans.

Learn more
SafeKey Pro

SafeKey Mobile

SafeKey Mobile is the mobile alternative to the internal custom storage of SafeKey Pro devices and is connected to your SafeID account.

Learn more
SafeKey Mobile

Inheriti® Vault

Safe and reliable cloud solution for securely storing mobile shares for a limited period. With advanced encryption and robust security measures, mobile shares are safeguarded until beneficiaries are ready to claim them.

Learn more
Inheriti® Vault

Blockchain

Using the strength of distributed ledger or blockchain technology, your validator and backup shares are kept safe from anyone trying to open protection plans without permission. Blockchain’s design, where no one central entity can change things once they’re recorded, ensures that protection plans are kept safe and genuine.

Learn more
Blockchain
Merge Plan Shares

Revealing The Original Data

Inheriti®’s merging process prioritizes data security. It begins when the Merge Authority (MA) connects their SafeKey device, prompting Inheriti® to scan for linked plan shares. If multiple plans are found, the MA chooses one. The system confirms the MA’s authenticity and checks the activation methods like the Dead Man Switch.

If the owner doesn’t respond, it’s assumed they approve of or are no longer available. All remaining beneficiaries’ SafeKeys (either SafeKey Pro or SafeKey Mobile) are then used to decrypt plan shares.

Finally, Inheriti® merges these shares, revealing the original data.

Sign up
Revealing The Original Data

Start Planning for Tomorrow, Today.

From precious memories to crucial data and assets, Inheriti® offers both digital inheritance solutions and decentralized data backups. Ensuring your legacy and sensitive data are protected for generations to come.

Sign up