Confidentiality-first by design
Patent work demands discretion. Trace is built with security and confidentiality at its core—encryption, access controls, and comprehensive audit trails ensure your materials stay protected.
Our commitment to your confidentiality
Security is not a feature we added on — it is the foundation Trace is built on.
Confidentiality guaranteed
We understand that patent materials are among the most sensitive documents your organization handles. Every upload, analysis, and export is treated with the confidentiality it deserves.
No model training on your data
We do not use your patent documents or evidence materials to train our models. Your data is used only to provide the analysis service you requested.
Data sovereignty
Your organization retains full ownership of all data. We process it on your behalf and never claim rights to your patent materials or analysis outputs.
Security architecture
Built on institutional-grade security primitives, configured for patent confidentiality.
Data encryption
All data is protected with industry-standard encryption at every layer.
- TLS 1.3 for all data in transit
- AES-256 encryption at rest
- Encrypted database connections
- Secure key management and rotation
Access controls
Fine-grained permissions that control who can view, edit, and export analyses.
- Account-based authentication
- Role-based access control (RBAC)
- Granular sharing permissions
- Session management and timeout controls
SSO integration
Seamless authentication through your existing identity provider.
- SAML 2.0 support
- Enterprise identity provider integration
- Automatic user provisioning and deprovisioning
- Centralized access management
Audit logging
Complete visibility into every action taken within the platform.
- Comprehensive action logging
- Data access tracking
- Compliance-ready reporting
- Exportable audit trails
Privacy by design
We treat all uploaded materials as confidential and never train on your data.
- No use of customer data for model training
- Materials treated as confidential
- Minimized internal access to customer data
- Privacy-first architecture
Data retention controls
You control how long your data is retained with full export capabilities.
- User-controlled data deletion
- Configurable retention policies
- Full data export controls
- Secure data purging
Enterprise-ready
For organizations with advanced requirements
Trace supports custom deployment configurations, compliance documentation, and enterprise security options to meet the requirements of large IP teams, law firms, and corporate legal departments.
Custom deployment
Deployment configurations tailored to your security requirements.
Compliance documentation
Security questionnaires, data processing agreements, and audit support.
Data retention controls
Full data portability with configurable retention policies and secure deletion.
A note on transparency
Trace uses AI to structure patent claim analysis and map evidence to claim elements. We believe you should understand how those systems work and what they can and cannot do.
Every mapping in Trace is backed by cited evidence excerpts—source documents, page numbers, and specific passages. When the platform suggests a mapping, you can always see why. There are no black-box assessments or unexplainable match scores.
We are committed to building a platform you can trust with your confidential patent materials, and that starts with being clear about how we handle them. If you have questions about our approach, our team is happy to discuss the details.
Ready to see Trace in a secure environment?
Schedule a walkthrough of our security architecture and see how Trace meets your confidentiality and compliance requirements.