Whitepaper
Whitepaper
Technical specifications
Technical specifications

ITA offers a new approach based on the Proof-of-Game (PoG) consensus mechanism.
The model integrates gameplay elements into the blockchain network, transforming user actions into useful computational operations.
This approach ensures efficient use of resources and motivates network members through rewards for active interaction with game projects

ITA Blockchain Network

The concept of Proof-of-Game
Technical specifications
ITA offers a new approach based on the Proof-of-Game (PoG) consensus mechanism.
The model integrates gameplay elements into the blockchain network, transforming user actions into useful computational operations. This approach ensures efficient use of resources and motivates network members through rewards for active interaction with game projects

ITA Blockchain Network
Whitepaper

Proof-of-Work

High power consumption:
Mining requires significant computing resources

The need for expensive equipment:
Efficient mining requires specialized devices (ASICs, GPUs)

Missing payload:
Most of the computing resources are used to perform meaningless operations

Centralization:
The concentration of coins in the hands of large participants can lead to the centralization of the network and reduce the level of decentralization


High entry threshold for validators:
A significant number of coins are required to participate in block validation, which limits the participation of small participants

PoG replaces traditional computing with gaming activity, turning players ' efforts into useful operations for the network.
This allows you to reduce energy costs, increase user engagement, and increase decentralization by attracting a wide range of participants from the gaming community

Challenges of traditional blockchain models

Proof-of-Stake

Proof-of-Game
ITA Solution
Proof-of-Work
High power consumption:
Mining requires significant computing resources

The need for expensive equipment:
Efficient mining requires specialized devices (ASICs, GPUs)

Missing payload:
Most of the computing resources are used to perform meaningless operations
Centralization:
The concentration of coins in the hands of large participants can lead to the centralization of the network
and reduce the level of decentralization

High entry threshold for validators:
A significant number of coins are required to participate in block validation, which limits the participation of small participants
PoG replaces traditional computing with gaming activity, turning players ' efforts into useful operations for the network.
This allows you to reduce energy costs and increase user engagement
and increase decentralization
by attracting a wide range of participants from the gaming community.
Challenges of traditional blockchain models
Proof-of-Stake
Proof-of-Game
General principles of PoG operation

Proof-of - Game (PoG) is a type of Proof-of-Useful-Work,
in which the network payload is generated by players during their interaction with the game world. The PoG algorithm uses analytical parameters to collect data about the game's useful user actions and converts them into a unique hash, which is necessary for creating new blocks on the network

General principles of PoG operation

Proof-of - Game (PoG) is a type of Proof-of-Useful-Work,
in which the network payload is generated by players during their interaction with the game world. The PoG algorithm uses analytical parameters to collect data about the game's useful user actions and converts them into a unique hash, which is necessary for creating new blocks on the network

Generating hashes

List of running Processes:
Detect active games and apps.

Game Video Stream Analysis: Evaluation of graphics data
to confirm your activity and interact with the game world.

Mouse and keyboard movements: Track user interactions with the game to create unique hashes.

1

Masternode validation

Data integrity:
Checking that there are no attempts of falsification or fraud.

Usefulness of the work:
Using machine learning (ML) to analyze and confirm the usefulness of game activity for the network.

2

Creating a block

Additional information (fingerprint):
Enabling data on the user's PC status (CPU/GPU/RAM usage, device temperature, etc.) to improve network security and reliability

3

Main stages of PoG operation:

Proof-of-Stake
Proof-of-Game
Main stages of PoG operation:
Generating hashes
List of running processes:
Identifying active games and apps.

Game Video stream Analysis:
Evaluation of graphical data to confirm your activity and interact with the game world.

Mouse and keyboard movements: Track user interactions with the game to create unique hashes.
1
Creating
a block
Additional information (fingerprint):
Enabling data on the user's PC status (CPU/GPU/RAM usage, device temperature, etc.) to improve network security and reliability.
3
Masternode
validation
Data integrity:
Checking that there are no attempts of falsification or fraud.

Usefulness of the work:
Using Machine Learning (ML) for analysis and confirmation of the usefulness of the game activity for the network.
2
Client side:
Server part:
Local
driver
Installed on the user's PC
and analyzes the player's actions in real time

Obfuscated
software
Prevents unauthorized interference and attempts to falsify data
Minimum value
impact on resources
Miner program
doesn't use the GPU,
what allows you to play
without reducing system performance
Masternodes
Main network nodes responsible for block validation and hashes
Modified Ethash
Used for checking ad blocks
with the addition of
game parameters
and dynamically generated signatures

PoG Architecture

Client side:
PoG Architecture
Local
driver
Installed on the user's PC
and analyzes the player's actions in real time
Obfuscated
software
Prevents unauthorized interference and attempts to falsify data.
Minimum value
impact on resources
Miner program
doesn't use the GPU,
what allows you to play
without reducing system performance
Server part:
Masternodes
Main network nodes responsible for validating blocks and hashes
Modified Ethash
Used for checking ad blocks with the addition of game parameters
and dynamically generated signatures

Low-level data analysis

  • Checking running processes and activity at the driver level.
  • Analyze the game's video stream to confirm interaction with the game world.

Software Obfuscation

  • Hides the client's internal logic from external interference and potential attacks.

Masternodes with ML models

  • They use machine learning to analyze and confirm the usefulness of game activity, preventing fraud and fraud.

Dynamic block signing

  • It changes depending on the game activity, which makes it difficult for third parties to fake blocks.

Fraud prevention mechanisms

Low-level
data analysis
Software
Obfuscation
Masternodes
with ML models
Dynamic
block signing
Fraud prevention mechanisms

Rewards are distributed among players for active participation in game processes
Reward masternode owners for ensuring network security and stability
Reward developers for project development, marketing, and ecosystem support
45%
0 ITA
20,000,000 ITA

Dynamic reward management

Burn mechanisms

45%
10%
Distribution of awards
issue and inflation model
initial issue
maximum offer

Using Proof-of-Useful-Work to adapt the emission level depending on network activity and needs

Possible mechanisms for burning coins to control inflation and stabilize the value of ITA

Инфляционная модель: Регулирование эмиссии через динамическое уменьшение наград на основе показателей полезной работы, выполняемой сетью.

Rewards are distributed among players for active participation in game processes
Award
masternode owners
for ensuring network security and stability
Remuneration of developers for project development, marketing and ecosystem support
45%
45%
10%
Distribution of awards
0 ITA
20,000,000 ITA
Dynamic reward management
Burn mechanisms
issue and inflation model
initial issue
maximum offer
Using Proof-of-Useful-Work to adapt the emission level depending on network activity and needs
Possible mechanisms for burning coins to control inflation and stabilize the value of ITA
Integration with game projects

Game activity analysis

Different platforms

ITA Blockchain Network provides for the possibility of expanding the reward system
for various games and platforms via the API


Expansion
reward systems

Collect and process data about player actions to accurately distribute rewards

Integration
with various options
game platforms and genres to ensure a broad user reach

Ability to adapt the reward system
for specific mechanics
and features
every game

Expanding Rewards

Game activity analysis
Different platforms
ITA Blockchain Network provides for the possibility of expanding the reward system for various games and platforms via the API

Expansion reward systems
Collect and process data about player actions to accurately distribute rewards

Integration with various gaming platforms to ensure broad user reach

Аbility to adapt the reward system to the specific mechanics and features of each game
Expanding Rewards
Road map
Telegram RU
Twitter
Discord
Profile WOT
Explorer ITA
Contacts and links
Official website of the PAC project
Official website of the ITA project
Contacts and links
Official website of the PAC project
Official website of the ITA project
ITA Documentation
ITA Documentation
Write to us
Write to us
ITA Blockchain Network
Whitepaper
Whitepaper
Write to us
ITA Documentation
ITA Blockchain Network
Whitepaper
Made on
Tilda