The page describes how Proof-of-Game (PoG) works in ITA Blockchain, including the basic steps, architecture, anti-fraud mechanisms, and client-server interaction.
Proof-of-Game (PoG) is a variation of Proof-of-Useful-Work, where the network’s useful workload is generated by players interacting with the gaming world.
The PoG algorithm collects analytical data about a user’s valuable in-game actions and converts it into a unique hash, required for creating new blocks in the blockchain.
The PoG mechanism in ITA Blockchain operates through a multi-level process to ensure the accuracy, utility, and security of data from gaming clients.
Each stage focuses on analyzing, validating, and integrating gaming actions into the blockchain.
Process List Monitoring
Identifies active games and applications to confirm user engagement.
Game Video Stream Analysis
Evaluates graphical data to verify activity and interaction with the gaming environment.
Mouse and Keyboard Movements
Tracks user inputs to generate unique hashes.
Data Integrity
Checks for any attempts at data falsification or manipulation.
Work Utility
Utilizes machine learning (ML) to analyze and verify the network’s gaming activity relevance.
Supplementary Data (Fingerprint)
Includes system metrics like CPU/GPU/RAM usage and device temperatures to enhance network security and reliability.
The architecture of Proof-of-Game in ITA Blockchain is divided into client-side and server-side components, each playing a vital role in ensuring the network’s honesty, security, and efficiency.
The client-side focuses on collecting and analyzing gaming data, while the server-side handles validation and blockchain integration.
Local Driver
Installed on the user’s PC to analyze gaming activity in real time.
Minimal Resource Impact
The miner software does not use GPUs, allowing seamless gameplay without system performance degradation.
Obfuscated Software
Protects the client’s logic from unauthorized interference or data manipulation.
Masternodes
Key network nodes responsible for validating blocks and hashes.
Modified Ethash
Validates blocks with added gaming parameters and dynamically generated signatures.
ITA Blockchain implements multi-level approaches to safeguard the network from fraud and manipulation. These mechanisms ensure that user-generated data is authentic and beneficial for the network, guaranteeing its security and resilience.
Low-Level Data Analysis
Checking running processes and driver-level activity.
Game video stream analysis сonfirms user interaction with the gaming world.
Software Obfuscation
Conceals the internal logic of the client from external interference and attacks.
Dynamic Block Signatures
Adapt based on gaming activity, making block falsification challenging.
Masternodes with ML Models
Employ machine learning to analyze and validate the utility of gaming activity, preventing fraud and manipulation.