the protocol POWERING

Quadrant Protocol is the engine that powers Quadrant's data mapping capabilities. One of the first operational blockchain-based data protocols, it is already mapping the data universe for its users


a foundation built on cutting edge technology

Quadrant Protocol is built with the most advanced technology that currently exists. It combines the powerful capabilities of the blockchain with new innovations developed by the Quadrant team to stamp and map disparate data sets. Quadrant is building world-leading data technology that enables complex data transactions.

Data Stamping

We stamp data for authenticity, allowing our users to trace and verify the provenance of the data

Guardian Nodes

The Guardian Nodes will execute Data Constellations based on smart contracts, distributing QUAD tokens according to their terms


Learn more ▶
Block Explorer

The Block Explorer will help increase transparency and trust in the big data economy by allowing users to track transactions within the Quadrant network.

Learn more ▶


Artboard 1_qi_1

The future of the protocol


equad and quad

For a new data economy to flourish, our platform needs to be both fast and secure. That's why Quadrant utilizes two tokens designed to compliment each other, by taking advantage of the efficiency of our Proof of Authority(PoA) consensus algorithm combined with the security of a public blockchain Proof of Work(PoW).

keep in touch

For access to news, updates, and announcements, sign up to our newsletter.

Frequently asked questions

What is Quadrant Protocol?

Quadrant Protocol is a blockchain-based protocol that enables the mapping, access, creation, and distribution of data products and services with authenticity and provenance at its core. The data economy is similar to space; unmapped and chaotic. Quadrant serves as the blueprint that provides an organized system for the utilization of decentralized data.

How does Quadrant Protocol operate?

Quadrant Protocol provides the infrastructure that facilitates the transparent exchange of DaaS and AI services between organizations. It enables data vendors to sell their data with the use of Data Smart Contracts. Likewise, it enables buyers to purchase data and trace its authenticity and provenance through the network’s data stamping verification system. In turn, this enables DaaS and AI service firms to build new products and services on top of the infrastructure and network.

Who are the main participants of Quadrant Protocol?

The main participants in Quadrant are the Nurseries, Constellations, Pioneers, Elons, and Guardians.

Nurseries; the atomic data providers that create the original data records. They create stars, which can then be grouped into constellations.

Constellations; the smart contracts that map multiple data sources into a single data product. These data products are then transacted between parties.

Pioneers; the entities that create data products with Quadrant’s smart contracts.

Elons; the entities that utilize the created data products and with them, build new and unique products and services. They rely on constellations and constellation blueprints to make sense of the data space, which they will travel through.

Guardians; the master nodes that protect the integrity of the chain, ensuring that it is not compromised. The Guardians ensure that the constellations created by the Pioneers are not compromised and provide the services of stamping data into the system.

How can companies use Quadrant Protocol?

Pioneers and Elons can start using Quadrant Protocol through Quadrant's data platform.

Contact us if you’d like to start authenticating your data via Quadrant Protocol; building data products; utilizing the data; or building services on top of the protocol.

Guardians must ask permission to join the network. Please head over to the Guardian Node Program page for more information about how to become a Guardian

What is the stamping protocol?

The stamping protocol is a system used to prove the authenticity of data. When data is produced, the nursery stamps the data’s “finger print” (the hash) into Quadrant Protocol. It enables Elons to verify, at the time of consumption, whether the data they received was in the exact same state as when it was created.