System and method wireless messaging in a wireless communication system

ABSTRACT

A wireless communication system, comprising a host service, a wireless router system coupled to the host service, a wireless network coupling the wireless router system and a wireless mobile communication device (“mobile device”), adaptively delivers data to the mobile device in the wireless communication system. 
     In another embodiment, a receive trigger is used by the host to initiate a session where messages are delivered to the mobile device. The host trigger consists of the receipt of a message from a host. Upon detection of a session, messages are sent to the device. If a session is inactive, login credentials are requested. Detection of a logoff trigger from the mobile device will terminate an existing session and current login credentials are also expired.

FIELD OF THE INVENTION

The present invention generally relates to a wireless communicationsystem, and more specifically to a system and a method for wirelessmessaging.

BACKGROUND OF THE INVENTION

In a conventional wireless communication system designed to deliver datato a wireless mobile communication device (“mobile device”) such as acellular telephone, a two-way pager, a wireless communication capablepersonal digital assistant (“PDA”), and other similar device, there areseveral main components. A host service, which provides services such ase-mail, calendar, and Internet web browsing, holds the data to bedelivered to the mobile device. Typically, the host service is coupledto a router, which couples the host service and a wireless network thatis designed to communicate with the mobile device. To make a timelydelivery of the data, the host service forwards the data for the mobiledevice to the router when the data becomes available. The router thenforwards the data to the wireless network, which transmits the data tothe mobile device. If the mobile device fails to receive the data, therouter queues the data and re-forwards the data to the wireless network,which re-transmits the data to the mobile device. This process continuesuntil the mobile device receives the data and acknowledges the receptionor the process times out after a predetermined time period.

In typical wireless communication systems, a mobile device requires aservice session to be established to be able to communicate wirelesslywith a host service. As is known, a service session (or session) istypically initiated by the mobile device and can be terminated for avariety of reasons. For example, if during an active session a mobiledevice roams out of wireless coverage, the session will be effectivelyterminated. Once out of coverage, no wireless activity such as sendingor receiving e-mail messages, browsing web sites or sending/receivinginstant messages can be conducted.

In some cases, it may be desirable to control service sessions ondemand, or in other words, to match the transmission needs of both themobile device and host services. For the same reasons, it may bedesirable to have the ability to initiate a session from a variety ofevents occurring at both the device or host service.

BRIEF DESCRIPTION OF THE DRAWING

For a better understanding of the embodiments described herein and toshow more clearly how it may be carried into effect, reference will nowbe made, by way of example only, to the accompanying drawings which showat least one exemplary embodiment in which:

FIG. 1 is an exemplary environment in which a wireless communicationsystem in accordance with at least one of the preferred embodiments maybe practiced;

FIG. 2 is an exemplary block diagram of a preferred embodiment of amobile communication device;

FIG. 3 is an exemplary sequence diagram illustrating communicationbetween different components of a wireless communication system.

DETAIL DESCRIPTION OF THE PREFERRED EMBODIMENTS

It will be appreciated that for simplicity and clarity of illustration,where considered appropriate, reference numerals may be repeated amongthe figures to indicate corresponding or analogous elements or steps. Inaddition, numerous specific details are set forth in order to provide athorough understanding of the embodiments described herein. However, itwill be understood by those of ordinary skill in the art that theembodiments described herein may be practiced without these specificdetails. In other instances, well-known methods, procedures andcomponents have not been described in detail so as not to obscure theembodiments described herein. Furthermore, this description is not to beconsidered as limiting the scope, of the embodiments described herein,but rather as merely describing the implementation of the variousembodiments described herein.

Examples of applicable communication devices include pagers, cellularphones, cellular smart-phones, wireless organizers, personal digitalassistants, computers, laptops, handheld wireless communication devices,wirelessly enabled notebook computers and the like, each of which iscapable of sending messages to one or more recipients.

A wireless communication system, comprising a host service, a wirelessrouter system coupled to the host service, a wireless network couplingthe wireless router system and a wireless mobile communication device(“mobile device”), adaptively delivers data to the mobile device in thewireless communication system.

According to an preferred embodiment, a state independent sessioninitiated by either a host service or a mobile device using logincredentials is provided. In this embodiment, an activity trigger is usedto initiate a session from the mobile device. Login credentials are sentfrom the device to the host for authentication and a service session isenabled upon successful authentication. Login credentials are aged andare reset if timed out, whereupon the mobile device would need to resendthe login credentials for the next session.

In another embodiment, a receive or host trigger is used by the host toinitiate a service session where messages are delivered to the mobiledevice. The host trigger consists of the receipt of a message from ahost. Upon detection of a service session, messages are sent to thedevice. If a session is inactive, the host operates to request logincredentials from the mobile device. Detection of a logoff trigger fromthe mobile device will terminate an existing session and current logincredentials will also expire.

FIG. 1 is an exemplary wireless communication system 100 in which awireless communication system in accordance with at least one of thepreferred embodiments may be practiced. The exemplary wirelesscommunication system 100 includes a plurality of host services (threeshown, 102, 104, and 106), each of which may have a plurality ofservices such as, but not limited to, e-mail, calendar, Internet webbrowser, and other applications, available to their subscribers. Thehost services 102, 104, and 106 are connected to a communication network108 such as Internet, which connects to a wireless router system 110allowing communication between the host services 102, 104, and 106 andthe wireless router 110. The wireless router system 110 may also beconnected to a host service, such as a local service 112, without thecommunication network 108. The wireless router system 110 is connectedto a plurality of wireless networks (three shown, 114, 116, and 118),each of which may support a plurality of mobile devices (one in eachwireless network is shown, 120, 122, and 124). The wireless networks114, 116, and 118 may be a cellular telephone network, a two-way pagingnetwork, a short range wireless network such as Bluetooth™ and IEEE802.11 compliant network, and others alike, and the mobile devices 120,122, and 124 are device compatible with the corresponding wirelessnetwork.

Mobile devices 120, 122 and 124 are two-way communication devices withadvanced data communication capabilities having the capability tocommunicate with other mobile devices or computer systems through anetwork of transceiver stations. The mobile device may also have thecapability to allow voice communication. Depending on the functionalityprovided by the mobile device, it may be referred to as a data messagingdevice, a two-way pager, a cellular telephone with data messagingcapabilities, a wireless Internet appliance, or a data communicationdevice (with or without telephony capabilities).

Referring to FIG. 2, shown therein is a block diagram of a mobile device120 in one exemplary implementation. The mobile device 120 comprises anumber of components, the controlling component being a main processor202 which controls the overall operation of mobile device 120.Communication functions, including data and voice communications, areperformed through a communication subsystem 204. The communicationsubsystem 204 receives messages from and sends messages to a wirelessnetwork 114. In this exemplary implementation of the mobile device 120,the communication subsystem 204 is configured in accordance with theGlobal System for Mobile Communication (GSM) and General Packet RadioServices (GPRS) standards. The GSM/GPRS wireless network is usedworldwide and it is expected that these standards will be supersededeventually by Enhanced Data GSM Environment (EDGE) and Universal MobileTelecommunications Service (UMTS). New standards are still beingdefined, but it is believed that they will have similarities to thenetwork behaviour described herein, and it will also be understood bypersons skilled in the art that the embodiments described herein areintended to use any other suitable standards that are developed in thefuture. The wireless link connecting the communication subsystem 204with the wireless network 114 represents one or more different RadioFrequency (RF) channels, operating according to defined protocolsspecified for GSM/GPRS communications. With newer network protocols,these channels are capable of supporting both circuit switched voicecommunications and packet switched data communications.

Although the wireless network 114 associated with mobile device 120 is aGSM/GPRS wireless network in one exemplary implementation, otherwireless networks may also be associated with the mobile device 120 invariant implementations. The different types of wireless networks thatmay be employed include, for example, data-centric wireless networks,voice-centric wireless networks, and dual-mode networks that can supportboth voice and data communications over the same physical base stations.Combined dual-mode networks include, but are not limited to, CodeDivision Multiple Access (CDMA) or CDMA2000 networks, GSM/GPRS networks(as mentioned above), and future third-generation (3G) networks likeEDGE and UMTS. Some other examples of data-centric networks include WiFi802.11, Mobitex™ and DataTAC™ network communication systems. Examples ofother voice-centric data networks include Personal Communication Systems(PCS) networks like GSM and Time Division Multiple Access (TDMA)systems.

The main processor 202 also interacts with additional subsystems such asa Random Access Memory (RAM) 206, a flash memory 208, a display 210, anauxiliary input/output (I/O) subsystem 212, a data port 214, a keyboard216, a speaker 218, a microphone 220, short-range communications 222 andother device subsystems 224.

Some of the subsystems of the mobile device 120 performcommunication-related functions, whereas other subsystems may provide“resident” or on-device functions. By way of example, the display 210and the keyboard 216 may be used for both communication-relatedfunctions, such as entering a text message for transmission over thenetwork 114, and device-resident functions such as a calculator or tasklist. Operating system software used by the main processor 202 istypically stored in a persistent store such as the flash memory 208,which may alternatively be a read-only memory (ROM) or similar storageelement (not shown). Those skilled in the art will appreciate that theoperating system, specific device applications, or parts thereof, may betemporarily loaded into a volatile store such as the RAM 206.

The mobile device 120 may send and receive communication signals overthe wireless network 114 after required network registration oractivation procedures have been completed. Network access is associatedwith a subscriber or user of the mobile device 120. To identify asubscriber, the mobile device 120 requires a SIM/RUIM card 226 (i.e.Subscriber Identity Module or a Removable User Identity Module) to beinserted into a SIM/RUIM interface 228 in order to communicate with anetwork. The SIM card or RUIM 226 is one type of a conventional “smartcard” that can be used to identify a subscriber of the mobile device 120and to personalize the mobile device 120, among other things. Withoutthe SIM card 226, the mobile device 120 is not fully operational forcommunication with the wireless network 114. By inserting the SIMcard/RUIM 226 into the SIM/RUIM interface 228, a subscriber can accessall subscribed services. Services may include: web browsing andmessaging such as e-mail, voice mail, Short Message Service (SMS), andMultimedia Messaging Services (MMS). More advanced services may include:point of sale, field service and sales force automation. The SIMcard/RUIM 226 includes a processor and memory for storing information.Once the SIM card/RUIM 226 is inserted into the SIM/RUIM interface 228,it is coupled to the main processor 202. In order to identify thesubscriber, the SIM card/RUIM 226 contains some user parameters such asan International Mobile Subscriber Identity (IMSI). An advantage ofusing the SIM card/RUIM 226 is that a subscriber is not necessarilybound by any single physical mobile device. The SIM card/RUIM 226 maystore additional subscriber information for a mobile device as well,including date book (or calendar) information and recent callinformation. Alternatively, user identification information can also beprogrammed into the flash memory 208.

The mobile device 120 is a battery-powered device and includes a batteryinterface 232 for receiving one or more rechargeable batteries 130. Insome embodiments, the battery 230 may be a smart battery with anembedded microprocessor. The battery interface 232 is coupled to aregulator (not shown), which assists the battery 230 in providing powerV+ to the mobile device 120.

The main processor 202, in addition to its operating system functions,enables execution of software applications 234 on the mobile device 120.The subset of software applications 234 that control basic deviceoperations, including data and voice communication applications, willnormally be installed on the mobile device 120 during its manufacture.

The software applications 234 include a message application 236. Themessage application 236 can be any suitable software program that allowsa user of the mobile device 120 to send and receive electronic messages.Various alternatives exist for the message application 236 as is wellknown to those skilled in the art. Messages that have been sent orreceived by the user are typically stored in the flash memory 208 of themobile device 120 or some other suitable storage element in the mobiledevice 120. In an alternative embodiment, some of the sent and receivedmessages may be stored remotely from the device 120 such as in a datastore of an associated host system that the mobile device 120communicates with.

Mobile device 120 further includes a device state module 240, an addressbook 242, a Personal Information Manager (PIM) 244, and other modules246. The device state module 240 provides persistence, i.e. the devicestate module 240 ensures that important device data is stored inpersistent memory, such as the flash memory 208, so that the data is notlost when the mobile device 120 is turned off or loses power. Theaddress book 242 provides information for a list of contacts for theuser. For a given contact in the address book, the information caninclude the name, phone number, work address and email address of thecontact, among other information. The other modules 246 may include aconfiguration module (not shown) as well as other modules that can beused in conjunction with the SIM/RUIM interface 228.

The PIM 244 has functionality for organizing and managing data items ofinterest to a subscriber, such as, but not limited to, e-mail, calendarevents, voice mails, appointments, and task items. A PIM application hasthe ability to send and receive data items via the wireless network 114.PIM data items may be seamlessly integrated, synchronized, and updatedvia the wireless network 114 with the mobile device subscriber'scorresponding data items stored and/or associated with a host computersystem. This functionality creates a mirrored host computer on themobile device 120 with respect to such items. This can be particularlyadvantageous when the host computer system is the mobile devicesubscriber's office computer system.

Additional applications may also be loaded onto the mobile device 120through at least one of the wireless network 114, the auxiliary I/Osubsystem 212, the data port 214, the short-range communicationssubsystem 222, or any other suitable device subsystem 224. Thisflexibility in application installation increases the functionality ofthe mobile device 120 and may provide enhanced on-device functions,communication-related functions, or both. For example, securecommunication applications may enable electronic commerce functions andother such financial transactions to be performed using the mobiledevice 120.

The data port 214 enables a subscriber to set preferences through anexternal device or software application and extends the capabilities ofthe mobile device 120 by providing for information or software downloadsto the mobile device 120 other than through a wireless communicationnetwork. The alternate download path may, for example, be used to loadan encryption key onto the mobile device 120 through a direct and thusreliable and trusted connection to provide secure device communication.

The data port 214 can be any suitable port that enables datacommunication between the mobile device 120 and another computingdevice. The data port can be a serial or a parallel port. In someinstances, the data port 214 can be a USB port that includes data linesfor data transfer and a supply line that can provide a charging currentto charge the battery 230 of the mobile device 120.

The short-range communications subsystem 222 provides for communicationbetween the mobile device 120 and different systems or devices, withoutthe use of the wireless network 114. For example, the subsystem 222 mayinclude an infrared device and associated circuits and components forshort-range communication. Examples of short-range communicationstandards include standards developed by the Infrared Data Association(IrDA), Bluetooth, and the 802.11 family of standards developed by IEEE.

In use, a received signal such as a text message, an e-mail message, orweb page download will be processed by the communication subsystem 204and input to the main processor 202. The main processor 202 will thenprocess the received signal for output to the display 210 oralternatively to the auxiliary I/O subsystem 212. A subscriber may alsocompose data items, such as e-mail messages, for example, using thekeyboard 216 in conjunction with the display 210 and possibly theauxiliary I/O subsystem 212. The auxiliary, subsystem 212 may includedevices such as: a touch screen, mouse, track ball, infrared fingerprintdetector, or a roller wheel with dynamic button pressing capability. Thekeyboard 216 is preferably an alphanumeric keyboard and/ortelephone-type keypad. However, other types of keyboards may also beused. A composed item may be transmitted over the wireless network 114through the communication subsystem 204.

For voice communications, the overall operation of the mobile device 120is substantially similar, except that the received signals are output tothe speaker 218, and signals for transmission are generated by themicrophone 220. Alternative voice or audio I/O subsystems, such as avoice message recording subsystem, can also be implemented on the mobiledevice 120. Although voice or audio signal output is accomplishedprimarily through the speaker 218, the display 210 can also be used toprovide additional information such as the identity of a calling party,duration of a voice call, or other voice call related information.

FIG. 3 is an exemplary sequence diagram illustrating communicationbetween different components of communication system 300. Communicationsystem 300 comprises of a host service 302, wireless router 304, and amobile device 306 operating on wireless network 308. Host service 302 issynonymous with host service 102, 104 and 106 of FIG. 1, and isresponsible for handling message delivery to and from mobile device 306.Host service 302 receives e-mail messages from its designated corporateemail server, such as Microsoft Exchange™, Lotus Notes™, and/or NovellGroupwise™, and temporarily stores the content on a host service server(not shown). In addition to supporting corporate mail servers, hostservice 302 may handle public mail services such as Yahoo Mail™,Microsoft Hotmail™, Google GMail™, and the like. Host service 302 mayalso handle other types of data services and messaging types such asinstant messages, web browsing, SMS, MMS and/or voice messages.

When a wireless service session is active between the mobile device 306and host service 302 (i.e., the user is logged onto a session), the useris able to send messages to the host service 302 and receive allincoming messages from host service 302. For example, a message thatarrives at host service 302 during an active session will be redirectedto wireless router 304, and then wirelessly routed across wirelessnetwork 308, to mobile device 306. One of a plurality of residentprograms 234, for example message application 236, then receives theincoming message and possibly displays it for the user to view on mobiledevice 306.

The creation of a communication session may be initiated at the hostservice 302 or at the mobile device 306. For example, a device-initiatedsession may be triggered by an activity trigger 310. An activity trigger310 is any event (user or device generated) that indicates to mobiledevice 306 and host service 302 that a user at mobile device 306 wouldlike to initiate a service session. Activity trigger 310 captures anyperceived user or device-initiated activity. Activity trigger 310 alsoincludes any user-initiated or device-initiated session login (i.e.,active session activation) and may be synonymously known as a logintrigger. Activity trigger 310 may be one or a combination of manyevents, including a manual or automatic login to a session, powering onthe device, turning on the radio, a keypress on keyboard 216, scrollingactivity on a thumbwheel, touch-screen input on a touch-screen display,or releasing the device from a holster or case.

A further example of an activity trigger that is either user ordevice-generated is a predefined Auto On event where the device isprogrammed to systematically turn on and initiate a session at apre-defined time or day. For example, an Auto On event may be to turnmobile device 306 on at 8:00 am on weekdays. Yet a further example of anactivity trigger is radio activity by mobile device 306. Radio activityincludes sending regular “ping” updates to host service 302 to check forany incoming messages, and/or “out of coverage” and “back in coverage”notifications. For example, when mobile device 306 is out of coverage,it may wish to inform host service 302 that it is back in coverage andcan continue its session.

Upon detection of activity trigger 310 may be either user ordevice-initiated, mobile device 306 sends login credentials entered bythe user to host service 302, at step 312. Login credentials includeauthentication information that enables the user to log onto a wirelesssession. These credentials may consists of a login name and password, ashared public or private key, a secret token and/or a VPN token. Logincredentials may be manually entered by the user or automatically storedin cache memory or permanent memory on mobile device 306. In certainembodiments, login credentials may undergo a redundancy check to ensurethat the credentials are correct. Incorrect values are dropped untilcorrect values are entered. Further embodiments of this invention maynot allow the process to proceed until correct credentials are entered.

Once the login credentials are received at host service 302, thecredentials are then authenticated, at step 314 by the host service 302for a predetermined authentication period. Authentication ensures thatthe login credentials are valid and that host service 302 can enable anactive session. To keep track of the authentication period, acredentials timer is started, at step 316 and thereafter a session isenabled, at step 318. In certain embodiments, if a session is active andthe credentials timer is running (i.e., the credentials are stillauthenticated and valid), the mobile device 306 does not send furtherlogin credentials to the host, at step 312 when further activitytriggers are detected, at step 310. Mobile device 306 may optionallysend notification of a further activity trigger to the host service 302with login credentials to reset the credentials timer and keep theservice session active. However, typically, once a session has beenactivated, further login credentials authentications are required onlyif the session is terminated or the credentials timer has expired.

A second example of a device-initiated session trigger is a logofftrigger 320. In this example, logoff trigger 320 occurs when mobiledevice 306 receives a session termination event (i.e., a log off event).Logoff trigger 320 may include such events as powering down the device,turning off the device's radio 204, mobile device 306 going out ofcoverage, or the user manually requesting a log off event. Logofftrigger 312 might also include an inactivity timeout where based on apredefined period of inactivity, the device logs off the session withthe host service 302. Logoff trigger 312 may also be an automatic AutoOff event where the device shuts down based on a programmed Auto Offdate and/or time. For example, mobile device 306 may be set to powerdown and log off a session at 11 pm each night when the user retires tobed.

Upon detecting a logoff trigger 320, mobile device 306 sends anotification to host service 302 to log off its current session, at step322. This notification message also informs host service 302 to expireor invalidate the existing login credentials. As a result, a new set ofcredentials would be required for a subsequent session. If any incomingmessages arrives at the host service 302 during an inactive session, themessage is stored in memory, at step 326, until the next active sessionwhere these queued messages can be sent down to the mobile device 306.

In addition to a device-initiated session, there may also existhost-initiated session. In certain embodiments, host-initiated sessionscan be initiated when a message receive trigger 330 is detected at thehost service 302. Message receive trigger 330 may be one or acombination of many events including receiving an e-mail message, aninstant message, a voicemail message, a SMS message or other forms ofdata messages where the intended recipient is the mobile device 306.

In this exemplary embodiment in FIG. 3, the message receive trigger 330is the receipt of an e-mail message. Upon receipt, host service 302checks to see that the login credentials previously received from themobile device 306 are valid or authenticated, at step 332. If thecredentials are deemed to be valid and mobile device 306 is currently ina session, a notification message is sent to the device 306, at step334. The notification message only serves to inform mobile device 306 ofincoming mail and does not contain any payload information related tothe incoming e-mail message.

Once mobile device 306 receives the notification message at step 334, itthen responds with a fetch request to fetch the message, at step 336.The request message also includes the device login credentials. Uponreceiving the fetch request, host service 302 authenticates the attachedcredentials, at step 338, and resets the credentials timer, at step 340.If the authentication is successful, host service 302 sends it to mobiledevice 306, at step 342.

However, if host service 302 deems that mobile device 306 is not in anactive session (e.g. logged off), it sends a request for logincredentials, at step 344 and subsequently, host service 302 and mobiledevice 306 perform steps 310 to 318 again to enter into an activeservice session.

Specifically, mobile device 306 responds to this credentials requesteither by the detection of a user-initiated activity trigger or by adevice-initiated activity trigger, at step 310. An example of adevice-initiated activity trigger is a regular “ping” update sent frommobile device 306 to host service 302 reporting to host service 302 thestatus of the device 306. This “ping” update activity trigger alsoincludes login credentials (step 312). Upon successful authentication(step 314), mobile device 306 logs onto host service 302 with an activesession (step 318). Once a message arrives (step 330) at the hostservice 302, a quick check is done to ensure valid credentials (step332). A notification is sent to the mobile device 306 informing thedevice 306 of the new message (step 334), whereupon the device 306responds with a fetch request, including a set of credentials (step336). The credentials are then authenticated (step 338) and thecredentials timer is reset (340) to keep the authentication valid foranother authentication period. Thereafter, the message is sent from thehost service 302 to the device (step 342).

The aforementioned embodiment in FIG. 3 highlights an example where forevery single message received at host service 302, a separatenotification message is sent to mobile device, at step 334. Further aseparate fetch request with credentials is sent back to the hostservice, at step 336. And finally, each message is separately sent tothe device 306, at step 336. However, it is understood that furtherembodiments may exist where notifications, fetch requests and/ormessages are batched together and sent in one larger batch message.Sending notifications, fetch requests and messages in batch mode (i.e.,send one larger messages for many smaller separate messages)advantageously reduces network latency since less data is sent acrossthe network 308.

Further batch messages may occur at timed intervals. For example, hostservice 302 may queue messages received in 10 minute intervals (or anyother prescribed intervals). In this example, every 10 minutes, hostservice 302 would send a batch notification advising mobile device 306of all new messages that have arrived within a 10 minute timeframe. Themobile device 306 may respond with a batch fetch request, upon receiptof which the host service 302 would send all the messages it hasreceived within the interval to the mobile device 302 in one batchmessage.

Once credentials are authenticated, at step 314, the credentials areonly valid for a certain period of time which is defined by thepredetermined authentication period mentioned above. This authenticationperiod (which can be any predetermined value) is accounted for bysetting the credentials timer to this value and decrementing it orsetting the timer to zero and incrementing it until it reaches theauthentication period value. Once the credentials timer has expired(i.e. reached zero or the authentication period value), at step 316,mobile device 306 can no longer maintain a session active unless a newtrigger is detected at either the host or at the device and newcredentials are authenticated. Note that login credential authenticationat steps 314 and 338 are compared with a set of valid credentials storedat host service 302.

While the preferred embodiments of the invention have been illustratedand described, it is to be understood that the invention is not solimited. Numerous modifications, changes, variations, substitutions andequivalents will occur to those skilled in the art without departingfrom the spirit and scope of the present invention as defined by theappended claims.

1. A method in a host service for controlling service sessions betweenthe host service and a wireless mobile device which is operable in awireless network, the method comprising the steps of: queuing, over apredetermined time interval, one or more electronic mail (e-mail)messages received at an e-mail server for delivery to the wirelessmobile device; detecting, at the host service, a trigger in response toan expiration of the predetermined time interval; in response to thedetecting of the trigger and when the one or more e-mail messages arequeued: attempting to authenticate, at the host service, at least onepreviously received login credential of the wireless mobile device withrespect to a predetermined authentication period, the at least onepreviously received login credential being previously received at thehost service from a previous login of the wireless mobile device at thehost service for activating a service session for e-mail messagedelivery; when the host service identifies that the predeterminedauthentication period associated with the at least one previouslyreceived login credential has not expired, the service session fore-mail message delivery being active; otherwise, when the host serviceidentifies that the predetermined authentication period associated withthe at least one previously received login credential has expired, whichindicates that the service session for e-mail message delivery isinactive, then: requesting, via the wireless network, at least one newlogin credential of the wireless mobile device; receiving, via thewireless network, the at least one new login credential from thewireless mobile device; authenticating, at the host service, the atleast one new login credential; activating the service session fore-mail message delivery based on the authenticating of the at least onenew login credential; and when the service session for e-mail messagedelivery is active: causing the one or more e-mail messages to be sentin a batch mode, from the host service via the wireless network, to thewireless mobile device.
 2. The method of claim 1 wherein the e-mailmessage is received in a personal information manager (PIM) applicationof the wireless mobile device.
 3. The method of claim 1 furthercomprising: in response to the detecting of the trigger and when the oneor more e-mail messages are queued and the service session is active:creating, at the host service, a batch notification message which isindicative of the receipt of the one or more e-mail messages: sending,via the wireless network, the batch notification message to the wirelessmobile device; receiving, at the host service, a batch fetch requestfrom the wireless mobile device in response to sending the batchnotification message; and causing the one or more e-mail messages to besent, from the host service via the wireless network, to the wirelessmobile device in response to receiving the batch fetch request.
 4. Themethod of claim 1 further comprising: receiving, via the wirelessnetwork, at least one new login credential from the wireless mobiledevice in response to the batch notification message.
 5. The method ofclaim 1 wherein the received new login credential is generatedautomatically by the wireless mobile device.
 6. The method of claim 5wherein the batch fetch request message includes at least one otherlogin credential, and wherein prior to sending the one or more e-mailmessages to the wireless mobile device, the method further comprises:authenticating the at least one other login credential with respect toanother predetermined authentication period; and activating the servicesession for e-mail message delivery for the other predeterminedauthentication period.
 7. The method of claim 1 wherein the step ofactivating the service session for e-mail message delivery furthercomprises enabling the service session if the at least one new logincredential is authenticated successfully.
 8. The method of claim 1wherein the at least one previously received login credential includesat least one of a login, password, a shared public, a private key, asecret token or a virtual private network (VPN) token.
 9. The method ofclaim 1 wherein payload information of the one or more e-mail messagesis absent from the batch notification message.
 10. The method of claim 1wherein the batch notification message comprises a SMS message.
 11. Themethod of claim 1 wherein the act of authenticating comprises the act ofchecking validity of the at least one previously received logincredential based on a credentials timer corresponding to thepredetermined authentication period.
 12. A host service for controllingservice sessions with a wireless mobile device which is operable in awireless network, the host service being adapted to queue, over apredetermined time interval, one or more electronic mail (e-mail)messages received at an e-mail server for delivery to the wirelessmobile device; detect a trigger in response to an expiration of thepredetermined time interval; in response to the detecting of the triggerand when the one or more e-mail messages are queued: attempt toauthenticate at least one previously received login credential of thewireless mobile device with respect to a predetermined authenticationperiod, the at least one previously received login credential beingpreviously received at the host service from a previous login of thewireless mobile device at the host service for activating a servicesession for e-mail message delivery; when the predeterminedauthentication period associated with the at least one previouslyreceived login credential has not expired, the service session fore-mail message delivery being active; otherwise, when the predeterminedauthentication period associated with the at least one login credentialhas expired, which indicates that the service session for e-mail messagedelivery is inactive, then: request via the wireless network at leastone new login credential of the wireless mobile device, receive via thewireless network the at least one new login credential from the wirelessmobile device, authenticate the at least one new login credential, andactivate the service session for e-mail message delivery based on theauthenticating of the at least one new login credential; and when theservice session for e-mail delivery is enabled active: cause the one ormore e-mail messages to be sent in a batch mode, via the wirelessnetwork, to the wireless mobile device.
 13. The host service of claim 12wherein the one or more e-mail message are received in a personalinformation manager (PIM) application of the wireless mobile device. 14.The host service of claim 12 which is further adapted to, in response tothe detecting of the trigger and when the one or more e-mail messagesare queued and the service session is active: create a batchnotification message which is indicative of the receipt of the one ormore e-mail messages; send, via the wireless network, the batchnotification message to the wireless mobile device; receive a batchfetch request message from the wireless mobile device in response tosending the batch notification message; and cause the one or more e-mailmessages to be sent, via the wireless network, to the wireless mobiledevice in response to receiving the batch fetch request message.
 15. Thehost service of claim 12 which is further adapted to receive, via thewireless network, at least one new login credential from the wirelessmobile device in response to the batch notification message.
 16. Thehost service of claim 14, wherein the batch fetch request messageincludes at least one other login credential, and wherein prior tosending the one or more e-mail messages to the wireless mobile device,the host service is further adapted to authenticate the at least oneother login credential of the wireless mobile device with respect toanother predetermined authentication period; and activate, the servicesession for e-mail message delivery for the other predeterminedauthentication period.
 17. The host service of claim 12 which is adaptedto activate the service session for e-mail message delivery if the atleast one previously received login credential is authenticatedsuccessfully.
 18. The host service of claim 12, wherein the at least onepreviously received login credential includes at least one of a login,password, a shared public, a private key, a secret token or a virtualprivate network (VPN) token.
 19. The host service of claim 12, whereinpayload information of the one or more e-mail messages are absent fromthe batch notification message.
 20. The host service of claim 12,wherein the batch notification message comprises an SMS message.
 21. Thehost service of claim 12, which is further adapted to authenticate theat least one previously received login credential by checking a validityof the at least one previously received login credential based on acredentials timer corresponding to the predetermined authenticationperiod.