Apple continues working to develop a way in which third-party developers can produce true applications for the iPhone, but is implementing control of the process.

A report last week claimed Apple to be working to implement better support for web-based applications to make it easier for developers outside the future magic developer circle to build for the company's popular device.

A report on 9-5 Mac claims Apple has been: "Furiously working with its partners on games and applications for the iPhone/iPod and the standardized Human-Interface Controls that will go along with them."

This report claims Electronic Arts is presently porting its iPod games to the new iPod and iPhone platforms, adding, "other big developers with strict confidentiality agreements are also on board."

It has also been reported that Apple has hired staff experiences in the Sidekick mobile platform to develop mobile applications for its devices which it will eventually sell through iTunes.

Summarising the various rumours on the topic, the company is now widely expected to establish a controlled access system for developers.

Apple will choose which developers to work with, maintaining tight control in order to protect platform integrity and to ensure network and device compatibility. The company may also demand rights to sell software developed by others, most likely through iTunes.

iPhone users and third-party developers have been working hard to unlock the device in order to make it possible to load additional applications on the mobile device.

Apple has warned that such unlocks may see a user's iPhone rendered inoperable in future software updates. The war between Apple and hackers on the battleground of the iPhone has already begun.

iPhone customers meanwhile are hoping for the chance to add other applications to their devices, meaning Apple has so far been forced to spurn both users and hackers in its attempt to preserve iPhone's platform integrity.

If the latest reports are to be believed, Apple must be hoping that establishing a firmly controlled but accessible application development, testing and distribiution model may break the emerging union of desire between customers and hackers.