Wireless locating and tracking systems

ABSTRACT

A locating and tracking system is provided in which the assets desired to be located and tracked are associated with either radio frequency (RF) tags or radio frequency identification and radio frequency data communication (RFID/RFDC) devices. Depending on which device is attached to the asset, the other device is located at known locations. The RFID/RFDC devices interrogate and receive signals from the RF tags. The received information is sent to a host computer. With the location of either the RF tags or RFID/RFDC devices known, the assets may be located and tracked. An improved RF tag antenna design is also provided by using a switching mechanism connected to at least two antennas.

BACKGROUND OF THE INVENTION

This invention relates to wireless locating and tracking systems, and more particularly to locating and tracking physical assets or personnel, and taking inventory with radio frequency (RF) tags and radio frequency identification and radio frequency data communication (RFID/RFDC) devices.

There are existing systems that locate and track assets via triangulation techniques. An exemplary system may use radio beacons attached to the assets and at least three receivers placed at known locations. By measuring the time delay in the received signals at each receiver, the asset can be mapped to a location. This type of system typically has a low level of resolution and accuracy. The resolution and accuracy depend upon the ability to measure extremely small time delays and synchronize each receiver to a common clock. Multi-path fading effects and other types of interferences also introduce errors into this type of system. This setup tends to be costly in relatively small sites where at least three receivers need to be used and can become very expensive in large sites when more receivers need to be added.

In the past, RF tags have been used in a limited capacity to track the location of assets. For example, RF tags have been mounted on crates or pallets used in storage facilities. RF readers may be located at certain points such as at the exits or entrances of the storage facilities and may read the RF tags on the pallet and send the RF tag's identification to a central computer. The central computer may determine the contents of the contents of the pallet or determine if the pallet is ready for shipment by comparing the identification with an electronic manifest. This system, however, does not provide the ability to track assets within storage facilities and does not provide total asset visibility. Similar systems are in use with electronic article surveillance systems to prevent retail theft.

RF tags are optimally interrogated when an antenna associated with the RF tag is parallel to the reader antenna. Nevertheless, many applications require that the tag be read in any orientation with respect to the reader antenna. Prior systems have used more than one antenna in the reader such that each antenna is aligned orthogonally with respect to the other antennas, which creates more of an omni-directional type coverage. This approach may be impractical due to ergonomics, space, and size constraints. Therefore, there exists a need to make RF tags' antennas provide omni-directional coverage.

Another type of system that has been used to track the location of assets, particularly in warehouses, uses bar code technology. Employees use hand-held laser radio terminals, which communicate with a host computer, to scan assets at different stages within a warehouse. This system, however, provides a limited tracking resolution and is prone to human error.

It is therefore an object of the invention to track the location of assets with a greater degree of resolution.

It is further an object of the invention to track the location of assets with a user-selectable resolution.

It is further an object of the invention to poll asset inventory in order to obtain total asset visibility.

It is also an object of the invention to provide RF tags with omni-directional coverage.

SUMMARY OF THE INVENTION

These and other objects of the invention are accomplished in accordance with the principles of the present invention by providing methods and apparatus for locating and tracking assets, which, in at least one embodiment, are associated with radio frequency identification and radio frequency data communication (RFID/RFDC) devices and RF tags at known locations. The RFID/RFDC devices interrogate the RF tags and receive response signals from RF tags within range. This information may then be sent to a host computer which can, among other things, locate and track the assets.

The methods and apparatus of some embodiments may include locating and tracking assets in which the assets are associated the RF tags and the RFID/RFDC devices are placed at known locations. The RFID/RFDC devices interrogate the RF tags and receive response signals. This information may be sent to a host computer which may then determine, locate, and track the assets.

Another aspect of some embodiments of the invention includes an RF tag antenna design in which several antennas are connected via a switching mechanism. By selectively connecting the switching mechanism to different antennas, maximum range and omni-directionality may be obtained.

Further features of the invention, its nature and various advantages will be more apparent from the accompanying drawings and the following detailed description of the preferred embodiments.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a diagram of an illustrative wireless locating and tracking system in accordance with the present invention.

FIG. 2 is a diagram of an illustrative embodiment of a wireless locating and tracking system in accordance with the present invention.

FIG. 3 is a flow chart illustrating some of the steps involved in tracking the location of an asset associated with an RFID/RFDC device.

FIG. 4 is a diagram of another illustrative embodiment of a wireless locating and tracking system in accordance with the present invention.

FIG. 5 is a flow chart illustrating some of the steps involved in tracking the location of assets which are associated with locator tags.

FIG. 6 is a diagram of illustrative switchable antenna for an RF tag.

FIG. 7 is a flow chart illustrating some of the steps involved in determining the inventory of an area.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS

An illustrative simplified wireless locating and tracking system 10 in accordance with the present invention is shown in FIG. 1. The asset or assets desired to be located or tracked may contain either RF tag 40 or RFID/RFDC device 30. Depending on which device is attached to the asset, the other device, either the RF tag 40 or the RFID/RFDC device 30, is placed at a known location. Only one RF tag 40 and one RFID/RFDC device 30 are illustrated in FIG. 1 for clarity. It will be understood that multiple RF tags 40 and RFID/RFDC devices 30 that may be present in system 10.

RFID/RFDC device 30 contains a radio frequency identification circuit that provides signals to and receives signals from RF tag 40 via communications path 35. RFID/RFDC device 30 typically sends interrogation signals to RF tag 40. Communications path 35 is a wireless communications path which may include acoustic, optical (e.g., infra-red), radio frequency communications, a combination of these paths or any other suitable communications link. RFID/RFDC device 30 also may communicate with host computer 20 over communications path 25. Communications path 25 may be a wireless local area network (LAN) such as a Spectrum24® High-Performance Wireless LAN available from Symbol Technologies, Inc., One Symbol Plaza, Holtsville, N.Y., 11742–1300. Communications path 25 may also be acoustic, optical (e.g., infra-red), other types of radio frequency communications, hard wired or any combination of the above. RFID/RFDC device 30 may communication directly to host computer 20 or through intermediate steps. For example, RFID/RFDC device 30 may communicate with a nearby access point of a wireless LAN which in turn routes the data to host computer 20.

RF tag 40 receives signals from and transmits signals to RFID/RFDC device 30 over communications path 35. RF tag 40 is preferably passive but may be active, if desired. When RF tag 40 receives an interrogation signal, RF tag 40 may or may not send a response signal. RFID/RFDC device 30 may be able to interrogate an individual, some, or all RF tags 40. RF tag 40 may contain memory such as read only memory (ROM), random access memory (RAM), flash memory, Erasable Programmable Read Only Memory (EEPROM), or the like which stores information. For example, RF tag 40 may contain a preamble message code that may contain a code specific to RF tags 40, system 10, and/or the asset or location associated with RF tags 40. Therefore, RFID/RFDC device 30 may be able to address specific RF tags 40 by using codes in the interrogation signal. RFID/RFDC device 30 may also be able to modify the content of the memory of a specific RF tag 40. Such memory modification may be particularly useful when an RF tag 40 is initially associated with an asset. This may be done, for example, by allowing an asset code to be entered and stored in the RF tag 40. RF tags 40 may also be individually addressable based on the frequency of the interrogation signal or by any other suitable method (e.g., unique addresses). Alternatively, RF tags 40 may send response signals that are specific to a particular RF tag 40, system 10, and/or the asset or location associated with RF tag 40. The response signals from separate RF tags 40 may be distinguishable by their frequency, a time delay, unique identifier, or by any other suitable method.

Host computer 20 may be a central server, desktop workstation, laptop computer, or any other computer device. Host computer 20 may communicate with RFID/RFDC device 30 through a wireless network interface or through any other suitable communications link. Host computer 20 may contain a database of assets, RF tags 40, RFID/RFDC devices 30, and/or the location of stationary RF tags 40 and stationary RFID/RFDC devices 30.

FIG. 2 is a partial plan view of an illustrative embodiment of the locating and tracking system 10 for use in a facility such as a healthcare facility (Although use in other types of facilities is possible). In this embodiment, RFID/RFDC device 30 may be associated with a health care worker 50. RFID/RFDC device 30 may be a stand alone device or integrated into the cell phone of worker 50, personal data assistant (PDA), pager, personal electronic device (PED), or any other device associated with worker 50. RFID/RFDC device 30 communicates with host computer 20 over communications path 25. In some embodiments multiple communication paths 25 may be present. Furthermore, there may be additional RFID/RFDC devices 30 that are associated with other assets such as a wheelchair, emergency stretcher, other medical equipment, or any other person or device (not shown).

RF tags 40 are placed at known locations and are referred to as marker tags 41 a–e for the sake of clarity. While only five marker tags are shown in FIG. 2, it will be understood that additional marker tags 40 may be deployed if desired. Marker tags 41 a–e may contain some or all of the functionality and features of RF tags 40 and are preferably situated at known locations. Marker tags 41 a–e are shown attached to the walls 70 of the healthcare facility. They may, for example, be hidden behind wallpaper, embedded in the molding either on the floor or ceiling, or embedded in a decorative strip. Alternatively, they may be located in the floor, ceiling, entrance to rooms, or any other suitable location.

RFID/RFDC device 30 periodically or upon request from host computer 20 provide interrogation signals to marker tags 41 a–e. The interrogation signals from RFID/RFDC device 30 have a certain effective interrogation range that may be a function of RFID/RFDC device 30 and/or markers tags 41 a–e. The effective interrogation range is illustrated as cell boundary 32. Marker tag 41 a is currently within cell boundary 32. Thus, when RFID/RFDC device 30 provides an interrogation signal, marker tag 41 a receives that signal and generates a response signal which is received by RFID/RFDC device 30. Cell boundary 48 represents the effective range in which RFID/RFDC device 30 will receive the response signal. RFID/RFDC device 30 may process the response signal to determine the identification of the marker tag which generated that signal. RFID/RFDC device 30 may periodically, upon request from the host computer 20, or upon receiving a new marker tag identification send host computer 20 the last identification received from a marker tag. This allows the host computer to track the various assets that are associated with RFID/RFDC devices 30.

One benefit of system 100 is that its resolution may be directly traded-off at the cost of adding more (or less) passive marker tags, which are relatively low cost, at fixed locations. By adding more passive marker tags within the same area, the location of an asset within that area may be determined to a greater degree of accuracy, and thus a greater resolution. System 100 therefore has a user-selectable resolution. System 100 also allows variable resolution by varying the density of marker tags. For example, at most, it may only be desired to locate which room the worker 50 is currently in. Therefore, only a single marker tag may be necessary in each room, independent of the room's size.

Depending on the desired resolution, it may be beneficial to vary the size of the cell boundaries 48 and 32 associated with the various RFID/RFDC devices 30 and marker tags 41 used in system 100. For example, if a greater amount of resolution is desired, marker tags 41 could be placed close together and their respective cell boundaries 48 may overlap. Therefore, it may be desired to decrease the size of the cell boundaries 48.

Alternatively, cell boundaries 48 may be allowed to overlap, which may result in RFID/RFDC devices 30 receiving response signals from more than one marker tag 41. If an RFID/RFDC device 30 receives signals from more than one marker tag 41, then device 30 may process the signals in order to determine which marker tag 41 is closest to that device 30. This may be accomplished by measuring the strength of the received response signals to determine which marker tag 30 is closest.

Signal strength may also be used to determine the location of the RFID/RFDC device 30 to a greater degree of accuracy. For example, if an RFID/RFDC device 30 receives two response signals and determines that the strength of each signal is roughly equivalent, then RFID/RFDC device 30 may be located between the two marker tags 41. If strength of the received response signals are monitored frequently, the direction in which the RFID/RFDC device 30 is moving may be determined in real time.

Some of the steps involved in tracking the location of an asset with overlapping cell boundaries 48 are shown in FIG. 3. As FIG. 3 shows, at step 150, interrogation signals may be sent from RFID/RFDC device 30 associated with the worker 50 to marker tags 41 associated with locating and tracking system 100. At step 155, RFID/RFDC device 30 may receive a response signal from marker tags 41. At step 160, RFID/RFDC device 30 processes the received response signal (if any) to determine the identity of the marker tag closest to that device 30. At step 165, RFID/RFDC device 30 may send the identity of the closest marker tag 41 to the host computer 20 so that the location of RFID/RFDC device 30 may be determined.

It will be understood that the steps shown in FIG. 3 are exemplary and that additional steps may be added and some of the steps may be omitted or modified. For example, RFID/RFDC device 30 may not send out interrogation signals. Alternatively, marker tags 41 may be active and periodically provide response signals automatically. As another variation to the foregoing, RFID/RFDC device 30 may send the response signal to host computer 20 which may determine the identity of the marker tag closest to that device 30.

Host computer 20 may determine the location of each asset from a database that contains the fixed location of each marker tag 41. The locations of assets tracked by host computer 20 may be accessible from other devices external to host computer 20. For example, host computer 20 may be accessible from within an internal network to allow any person to track and locate an asset (e.g., from a remote terminal). In addition, worker 50 may be able to query host computer 20 with his or her RFID/RFDC device 30 to determine the location of other assets. For example, if worker 50 needs a piece of equipment in a hurry, he or she may be able to query host computer 20 as to the location of an available piece that is closest to his or her present location.

In FIG. 2, cell boundary 48 of marker tag 41 a extends over both sides of the wall 70 to which it is attached. This could potentially cause a problem as to the location of the worker 50. If worker 50 was actually on the other side of the wall in the adjacent room, the same response signal would be received. One solution to this potential problem is to prevent the response signals from spreading behind wall 70. This may be done by focusing an antenna in marker tag 41 a into the hallway or by blocking the response signal within marker tag 41 a from spreading towards the wall. This is why cell boundary 48 for marker tag 41 a is shown in a dashed line behind the wall 70.

Alternatively, an algorithm may be used by host computer 20 to determine whether worker 50 is in the room or the hallway. The algorithm may use the last known location of worker 50 to determine where worker 50 is currently located. For example, if worker 50 just left the room containing host computer 20, then marker tag 41 e would be the last marker tag identified by the RFID/RFDC devices 30 associated with worker 50. Therefore, if the next marker tag identified is marker tag 41 a, then worker 50 must be located in the hallway. While it may not be explicitly clear from FIG. 2, there is no way that worker 50 could have gotten into the room behind marker tag 41 a without receiving response signals from other marker tags 41 such as marker tags 41 b, 41 c or other marker tags (not shown).

As an alternative to the foregoing, system 100 may be used outside in a park or in any other type of building such as a store or warehouse. For example, system 100 may allow a person in a large park to find the quickest route to a desired location while at the same time, allow the park costodian to determine the customer's habits or preferences to more effectively design the park.

System 100 may be extended to self-shopping systems where there is a need to track customers in a store. For example, the customer's self-shopper, which may have an RFID/RFDC device 30 incorporated within, can be sent relevant graphics or text associated with his or her position within the store. The customer's attention can therefore be directed to a sales item or other relevant information. The store may also track the customer's preferences, as well as typical trajectories in order to optimize floor and sales display layout.

System 100 may also be used to track assets in a warehouse. For example, assets may be associated with RFID/RFDC devices 30 and marker tags 41 may be placed at known locations throughout the warehouse. Marker tags 41 may provide cell coverage over the entire storage area of the warehouse. This may allow host computer 20 to query and obtain the location of all assets and thus achieve total asset visibility. Alternatively, some of the assets may be associated with RF tags 40 and others with RFID/RFDC devices 30. RF tags 40 associated with assets will be referred to as locator tags 42 for the sake of clarity. In this embodiment, the RFID/RFDC devices 30 associated with assets can receive both marker tags 41 and locator tags 42. By sending this information to host computer 20, the locations of the assets associated with the RFID/RFDC devices 30 and the nearby assets associated with locator tags 42 can be determined. This alternative arrangement generally has a lower cost of implementation because RFID/RFDC devices 30 typically cost more than RF tags 40.

FIG. 4 shows another illustrative embodiment of the locating and tracking system 10 in use in a warehouse facility. This embodiment, which will be referred to as system 200, has RFID/RFDC devices 30, shown as RFID/RFDC devices 30 a–d, placed in known locations. RFID/RFDC devices 30 may be strategically placed throughout the warehouse to create a cellular pattern with their cell boundaries 32. Cell boundaries 32 a–d are shown as being square for clarity. In many implementations, however, cell boundaries 32 a–d are generally circular in shape and overlap in certain regions to ensure coverage.

Assets 51 a–d may be any type of product or stock located in a warehouse. Each of assets 51 a–d is preferably associated with a respective one of locator tags 42 a–d. Each locator tag 42 which is in a cell boundary 32 of a particular RFID/RFDC device 30 is addressable by interrogation signals from that device 30 over communications path 35. One or more RFID/RFDC devices 30 may be in communication with host computer 20 over communications path 25. RFID/RFDC devices 30 which are not in direct communication with host computer 20 may relay their information to host computer 20 through other RFID/RFDC devices 30. This may be done by handing off data packets to other RFID/RFDC devices 30 until they arrive at an RFID/RFDC device 30 that is in communication with host computer 20. Therefore, a minimum number of access points may be used in system 200. Another advantage of system 200 is that more expensive RFID/RFDC devices 30 are not necessary for tagging each asset 51 and RF tags 40 which are typically passive will suffice. Also, once the cellular pattern is laid out to provide the desired resolution within different areas, dynamic resolution allocation, the infrastructure cost will be that of the relatively inexpensive locator tags 42 and the communication link 25 to the host computer 20.

As described above, system 200 allows total asset visibility and also enables certain assets to be located. For example, if a particular asset is desired to be located, host computer 20 may instruct RFID/RFDC devices 30 to send interrogation signals specific to the locator tag 42 associated with that asset. This allows the desired asset to be located.

Some of the steps involved in tracking the location of assets in the embodiment illustrated in FIG. 4 are shown in FIG. 5. At step 250, interrogation signals may be sent from the RFID/RFDC devices 30 to locator tags 42 associated with the assets. Either every locator tag 42, some of locator tags 42, or a specific locator tag 42 may be interrogated by the RFID/RFDC devices 30. At step 255, the RFID/RFDC devices 30 may receive response signals from the locator tags 42 that are in range of the RFID/RFDC devices 30. Alternatively, response signals may be received from locator tags 42 which were specifically addressed and are in range of the RFID/RFDC devices 30.

At step 260, the identity of the locator tags 42 that are in range of each RFID/RFDC device 30 may be determined. At step 265, the identity of the locator tags 42 in range of the RFID/RFDC devices 30 may be sent to the host computer 20 to determine the locations of the assets. If a particular RFID/RFDC device 30 did not receive any response signals, that device 30 may notify host computer 20 that no response signals were received. If a particular asset is identified as being within the range of more than one RFID/RFDC device 30, then host computer 20 may determine which RFID/RFDC device 30 the asset is closest to. As mentioned above, this may be done by comparing the signal strengths received at each RFID/RFDC device 30. The location of that asset may also be determined to a greater degree of accuracy, such as between the two or more RFID/RFDC devices 30 which received the response signal.

It will be understood that the steps shown in FIG. 5 are exemplary and that additional steps may be added and some of the steps may be omitted or modified. For example, RFID/RFDC devices 30 may send the received response signal or signals to host computer 20 which may determine the identity of the marker tags closest to devices 30.

While system 200 is described in use in a warehouse facility, it will be understood that system 200 may be implemented in a store, building or any other suitable environment where it is necessary to track or locate physical objects or people.

Due to the diverse media that interrogation signals must pass through when interrogating RF tags 40, optimum reader and tag antenna orientation is generally required in order to improve the chances of a successful interrogation. The basic trade-off in antenna design is directionality (range and power) versus omni-directionality. Bandwidth is also a factor in antenna design. The optimum antenna orientation is usually when the reader antenna is parallel to the RF tag 40 antenna. However, many applications require that the RF tag 40 be read in any orientation. Therefore, an RF tag 40 may not respond because of poor electromagnetic coupling between the RF tag 40 and a reader from polarity and/or orientation misalignments. Typically, low cost RF tag 40 antennas are either etched or printed onto a flat planar substrate. This structure provides limited means for creating a truly omni-directional tag antenna. However, a simple planar structure has many advantages including flexibility of application and low cost due to relative ease of high volume manufacturing.

FIG. 6 shows an improved antenna design 45 that can be fabricated from a flat planar substrate. Antenna 45 may include two or more antennas, such as three antennas 45 a–c. Each of antennas 45 a–c is electrically connected to a switching mechanism (not shown). The switching mechanism may switch between individual antennas 45 a, 45 b, and 45 c, or any combination of them in parallel. The switching mechanism may be implemented via micro-machined structures or by any other suitable method. With each of antennas 45 a–c aligned in the same plane, they each have a maximum directionality (gain) aimed in the same direction. Antenna 45, however, is preferably foldable such that antennas 45 a–c may be folded to form three orthogonal axes. With each of the antennas 45 a–c aimed at different coordinates in space (i.e., x, y, z), their directionalities are aimed at different coordinates in space. Thus, by switching which antenna is connected to a controller circuit in RF tag 40, maximum and range and omni-directionality may be obtained.

The design of antenna 45 allows it to be embedded into a corner of an asset such as asset 51 e. Another benefit of this design is that if desired, or if the folding of antenna 45 would be inappropriate for certain assets, antenna 45 may be used in the normal planar manner.

Antenna 45 would be particularly useful in system 200. In a crowded warehouse, there may be a certain percentage of assets which are in range of an RFID/RFDC device 30 but fail to be successfully interrogated. FIG. 7 shows some of the steps involved in determining the inventory in a warehouse with antennas 45. At step 350, the inventory may be polled by sending interrogation signals from RFID/RFDC devices 30 to locator tags 42 associated with the inventory. At step 355, the RFID/RFDC devices 30 may receive response signals from the locator tags 42.

At step 360, RFID/RFDC devices 30 may send signals to the locator tag 42 to activate the switching mechanism, thereby causing it to switch to another individual antenna or a plurality of antennas. These signals may be acoustic (e.g., ultrasonic), optical, or radio frequency. At step 365, the identity of the locator tags 42 that are in range of each RFID/RFDC device 30 may be determined from the received response signals. From step 365, step 350 may be performed, step 370 may be performed, or both steps may be performed. If step 350 is performed again, then RFID/RFDC devices 30 may sequence the switching mechanisms of locator tags 42 through each possible antenna combination and determine all of the assets within range. Then at that point perform step 370. If step 370 is performed, then the identity of the locator tags 42 that are in range of each RFID/RFDC device 30 will be sent to host computer 20 to determine the inventory and its location. This includes eliminating duplicate assets and determining the location of assets that are determined to be within range of more than one RFID/RFDC device 30.

It will be understood that the steps shown in FIG. 7 are exemplary and that additional steps may be added and some of the steps may be omitted or modified. For example, step 360 may occur after step 365. Also, if RFID/RFDC device 30 identifies the same locator tag 42 to be in range for more than one polling, device 30 may only send the identity of that tag 42 to host computer 20 once.

One skilled in the art will appreciate that the present invention can be practiced by other than the described embodiments, which are presented for purposes of illustration and not limitation, and the present invention is limited only by the claims which follow. 

1. A method for tracking an asset with a radio frequency identification/radio frequency data communication (RFID/RFDC) device and a plurality of marker tags, comprising: sending an interrogation signal from the RFID/RFDC device that has an interrogation range; receiving a first response signal to the interrogation signal from a first marker tag located at a first known location within the interrogation range; processing the first response signal with the RFID/RFDC device to determine a first identity of the first marker tag; receiving a second response signal to the interrogation signal from a second marker tag located at a second known location within the interrogation range; processing the second response signal with the RFID/RFDC device to determine a second identity of the second marker tag; and processing the first identity of the first marker tag and the second identity of the second marker to track the asset.
 2. The method defined in claim 1 wherein the asset is a person.
 3. The method defined in claim 2 wherein the RFID/RFDC device is incorporation within a cell phone.
 4. The method defined in claim 2 wherein the RFID/RFDC device is incorporated within a personal data assistant.
 5. The method defined in claim 2 wherein the RFID/RFDC device is incorporated within pager.
 6. The method defined in claim 1 wherein the first identity of the first marker tag and the second identity of the second marker tag are sent to a host computer system in response to a request from the host computer system and the host computer system conducts the processing of the first identity of the first marker tag and the second identity of the second marker to track the asset.
 7. The method defined in claim 1 wherein a third response signal to the interrogation signal is received from a third marker tag of the plurality of markers located at a third known location within the interrogation range, the method further comprising processing the first response signal and the third response signal to determine which of the first marker tag and the third marker tag is closest to the RFID/RFDC device.
 8. The method defined in claim 7 wherein the signal strength of the first response signal and third response signal received from the first marker tag and third marker tag are processed to determine which of the first marker tag and the third marker tag is closest to the RFID/RFDC device.
 9. A system for tracking an asset with a plurality of marker tags located at known locations, comprising: a radio frequency identification/radio frequency data communication (RFID/RFDC) device associated with the asset wherein the RFID/RFDC device: sends an interrogation signal that has an interrogation range; receives a first response signal to the interrogation signal from a first marker tag located at a first known location within the interrogation range; processes the first response signal to identify a first identity of the first marker tag; receives a second response signal to the interrogation signal from a second marker tag located at a second known location within the interrogation range; processes the second response signal to identify a second identity of the second marker tag; and a host computer system that receives the first identity of the first marker tag and the second identity of the second marker tag from the RFID/RFDC device and determines the location of the RFID/RFDC device from the first identity of the first marker tag and the second identity of the second marker tag.
 10. The system defined in claim 9 wherein the asset is a person.
 11. The system defined in claim 10 wherein the RFID/RFDC device is incorporated within a cell phone.
 12. The system defined in claim 10 wherein the RFID/RFDC device is incorporated within a personal data assistant.
 13. The system defined in claim 10 wherein the RFID/RFDC device is incorporated within a pager.
 14. The system defined in claim 9 wherein the host computer system receives the first identity of the first marker tag and the second identity of the second marker tag from the RFID/RFDC device in response to a request from the host computer system.
 15. The system defined in claim 9 wherein the RFID/RFDC device receives a third response signal from a third marker tag of the plurality of markers located at a third known location within the interrogation range in addition to receiving the first response signal from the first marker tag and wherein the RFID/RFDC device processes the received first response signal and third response signal to determine which of the first marker tag and third marker tag is closest to the RFID/RFDC device.
 16. The system defined in claim 15 wherein the signal strength of the first response signal and the third response signal received from the first marker tag and the third marker tag are processed to determine which of the first marker tag and the second marker tag is closest to the RFID/RFDC device. 