[ { "title": "System and method for application program operation on a wireless device", "publication_date": "2005/21/11", "number": "08045958", "url": "/2005/11/21/system-and-method-for-application-program-operation-on-a-wireless-device/", "abstract": "Embodiments described herein address mobile devices with non-secure operating systems that do not provide a sufficient security framework. More particularly, the embodiments described herein provide a set of applications to the device for providing security features to the non-secure operating system.", "owner": "Research In Motion Limited", "owner_city": "Waterloo, Ontario", "owner_country": "CA" }, { "title": "Access control systems and methods for motion control", "publication_date": "2005/22/02", "number": "07035697", "url": "/2005/02/22/access-control-systems-and-methods-for-motion-control/", "abstract": "A method of generating control commands to be executed by a motion control system under control of a plurality of system users to move an object in a desired manner. At least one restricted program element associated with the motion control system is identified. An application program used by the system users when controlling the motion control system is provided. The application program employs the at least one restricted program element. A plurality of access levels are determined. Each restricted program element is associated with one of the access levels. Each of the plurality of system users is associated with one of the access levels. Motion control commands are generated based on the application program, the access level of each system user, and the access level of each restricted program element.", "owner": "Roy-G-Biv Corporation", "owner_city": "Bingen", "owner_country": "US" } ]