Security

Confidentiality-first by design

Patent work demands discretion. Trace is built with security and confidentiality at its core—encryption, access controls, and comprehensive audit trails ensure your materials stay protected.

AES-256 encryption
SAML 2.0 SSO
Full audit trails
Commitment

Our commitment to your confidentiality

Security is not a feature we added on — it is the foundation Trace is built on.

Confidentiality guaranteed

We understand that patent materials are among the most sensitive documents your organization handles. Every upload, analysis, and export is treated with the confidentiality it deserves.

No model training on your data

We do not use your patent documents or evidence materials to train our models. Your data is used only to provide the analysis service you requested.

Data sovereignty

Your organization retains full ownership of all data. We process it on your behalf and never claim rights to your patent materials or analysis outputs.

Features

Security architecture

Built on institutional-grade security primitives, configured for patent confidentiality.

Data encryption

All data is protected with industry-standard encryption at every layer.

  • TLS 1.3 for all data in transit
  • AES-256 encryption at rest
  • Encrypted database connections
  • Secure key management and rotation

Access controls

Fine-grained permissions that control who can view, edit, and export analyses.

  • Account-based authentication
  • Role-based access control (RBAC)
  • Granular sharing permissions
  • Session management and timeout controls

SSO integration

Seamless authentication through your existing identity provider.

  • SAML 2.0 support
  • Enterprise identity provider integration
  • Automatic user provisioning and deprovisioning
  • Centralized access management

Audit logging

Complete visibility into every action taken within the platform.

  • Comprehensive action logging
  • Data access tracking
  • Compliance-ready reporting
  • Exportable audit trails

Privacy by design

We treat all uploaded materials as confidential and never train on your data.

  • No use of customer data for model training
  • Materials treated as confidential
  • Minimized internal access to customer data
  • Privacy-first architecture

Data retention controls

You control how long your data is retained with full export capabilities.

  • User-controlled data deletion
  • Configurable retention policies
  • Full data export controls
  • Secure data purging

Enterprise-ready

For organizations with advanced requirements

Trace supports custom deployment configurations, compliance documentation, and enterprise security options to meet the requirements of large IP teams, law firms, and corporate legal departments.

Custom deployment

Deployment configurations tailored to your security requirements.

Compliance documentation

Security questionnaires, data processing agreements, and audit support.

Data retention controls

Full data portability with configurable retention policies and secure deletion.

A note on transparency

Trace uses AI to structure patent claim analysis and map evidence to claim elements. We believe you should understand how those systems work and what they can and cannot do.

Every mapping in Trace is backed by cited evidence excerpts—source documents, page numbers, and specific passages. When the platform suggests a mapping, you can always see why. There are no black-box assessments or unexplainable match scores.

We are committed to building a platform you can trust with your confidential patent materials, and that starts with being clear about how we handle them. If you have questions about our approach, our team is happy to discuss the details.

Ready to see Trace in a secure environment?

Schedule a walkthrough of our security architecture and see how Trace meets your confidentiality and compliance requirements.