Consensus Concepts

The page describes how Proof-of-Game (PoG) works in ITA Blockchain, including the basic steps, architecture, anti-fraud mechanisms, and client-server interaction.

1. Fundamentals of Proof-of-Game (PoG)

Proof-of-Game (PoG) is a variation of Proof-of-Useful-Work, where the network’s useful workload is generated by players interacting with the gaming world.

The PoG algorithm collects analytical data about a user’s valuable in-game actions and converts it into a unique hash, required for creating new blocks in the blockchain.


2. Core Stages of PoG Workflow

The PoG mechanism in ITA Blockchain operates through a multi-level process to ensure the accuracy, utility, and security of data from gaming clients.

Each stage focuses on analyzing, validating, and integrating gaming actions into the blockchain.


HASH GENERATION

  • Process List Monitoring

Identifies active games and applications to confirm user engagement.

  • Game Video Stream Analysis

Evaluates graphical data to verify activity and interaction with the gaming environment.

  • Mouse and Keyboard Movements

Tracks user inputs to generate unique hashes.


MASTERNODE VALIDATION

  • Data Integrity

Checks for any attempts at data falsification or manipulation.

  • Work Utility

Utilizes machine learning (ML) to analyze and verify the network’s gaming activity relevance.


BLOCK FORMATION

  • Supplementary Data (Fingerprint)

Includes system metrics like CPU/GPU/RAM usage and device temperatures to enhance network security and reliability.


3. Proof-of-Game Architecture

The architecture of Proof-of-Game in ITA Blockchain is divided into client-side and server-side components, each playing a vital role in ensuring the network’s honesty, security, and efficiency.

The client-side focuses on collecting and analyzing gaming data, while the server-side handles validation and blockchain integration.


CLIENT-SIDE

  • Local Driver

Installed on the user’s PC to analyze gaming activity in real time.

  • Minimal Resource Impact

The miner software does not use GPUs, allowing seamless gameplay without system performance degradation.

  • Obfuscated Software

Protects the client’s logic from unauthorized interference or data manipulation.


SERVER-SIDE

  • Masternodes

Key network nodes responsible for validating blocks and hashes.

  • Modified Ethash

Validates blocks with added gaming parameters and dynamically generated signatures.


4. Fraud Prevention Mechanisms

ITA Blockchain implements multi-level approaches to safeguard the network from fraud and manipulation. These mechanisms ensure that user-generated data is authentic and beneficial for the network, guaranteeing its security and resilience.

Low-Level Data Analysis

  • Checking running processes and driver-level activity.

  • Game video stream analysis сonfirms user interaction with the gaming world.

Software Obfuscation

  • Conceals the internal logic of the client from external interference and attacks.

Dynamic Block Signatures

  • Adapt based on gaming activity, making block falsification challenging.

Masternodes with ML Models

  • Employ machine learning to analyze and validate the utility of gaming activity, preventing fraud and manipulation.

Last updated