Consensus Concepts
The page describes how Proof-of-Game (PoG) works in ITA Blockchain, including the basic steps, architecture, anti-fraud mechanisms, and client-server interaction.
1. Fundamentals of Proof-of-Game (PoG)
Proof-of-Game (PoG) is a variation of Proof-of-Useful-Work, where the network’s useful workload is generated by players interacting with the gaming world.
The PoG algorithm collects analytical data about a user’s valuable in-game actions and converts it into a unique hash, required for creating new blocks in the blockchain.
2. Core Stages of PoG Workflow
The PoG mechanism in ITA Blockchain operates through a multi-level process to ensure the accuracy, utility, and security of data from gaming clients.
Each stage focuses on analyzing, validating, and integrating gaming actions into the blockchain.
HASH GENERATION
Process List Monitoring
Identifies active games and applications to confirm user engagement.
Game Video Stream Analysis
Evaluates graphical data to verify activity and interaction with the gaming environment.
Mouse and Keyboard Movements
Tracks user inputs to generate unique hashes.
MASTERNODE VALIDATION
Data Integrity
Checks for any attempts at data falsification or manipulation.
Work Utility
Utilizes machine learning (ML) to analyze and verify the network’s gaming activity relevance.
BLOCK FORMATION
Supplementary Data (Fingerprint)
Includes system metrics like CPU/GPU/RAM usage and device temperatures to enhance network security and reliability.
3. Proof-of-Game Architecture
The architecture of Proof-of-Game in ITA Blockchain is divided into client-side and server-side components, each playing a vital role in ensuring the network’s honesty, security, and efficiency.
The client-side focuses on collecting and analyzing gaming data, while the server-side handles validation and blockchain integration.
CLIENT-SIDE
Local Driver
Installed on the user’s PC to analyze gaming activity in real time.
Minimal Resource Impact
The miner software does not use GPUs, allowing seamless gameplay without system performance degradation.
Obfuscated Software
Protects the client’s logic from unauthorized interference or data manipulation.
SERVER-SIDE
Masternodes
Key network nodes responsible for validating blocks and hashes.
Modified Ethash
Validates blocks with added gaming parameters and dynamically generated signatures.
4. Fraud Prevention Mechanisms
ITA Blockchain implements multi-level approaches to safeguard the network from fraud and manipulation. These mechanisms ensure that user-generated data is authentic and beneficial for the network, guaranteeing its security and resilience.
Low-Level Data Analysis
Checking running processes and driver-level activity.
Game video stream analysis сonfirms user interaction with the gaming world.
Software Obfuscation
Conceals the internal logic of the client from external interference and attacks.
Dynamic Block Signatures
Adapt based on gaming activity, making block falsification challenging.
Masternodes with ML Models
Employ machine learning to analyze and validate the utility of gaming activity, preventing fraud and manipulation.
Last updated