Dynamic inventory management of deployed assets

ABSTRACT

A dynamic inventory management method can include the step of attaching a location tag to a deployable asset. A mobile entity can be associated with the location tag. A tag scanner can scan for location tags within a range of the tag scanner. Data can be conveyed from the tag scanner to a communicatively linked inventory control system. The scanning and conveying steps can be repeated to dynamically update the inventory control system.

CROSS-REFERENCE TO RELATED APPLICATIONS

This is a continuation application of and which claims the benefit ofU.S. patent application Ser. No. 11/366,338, filed 2 Mar. 2006 and whichis hereby incorporated by reference.

BACKGROUND OF THE INVENTION

The present invention relates to the field of inventory management, and,more particularly, to dynamic inventory management of deployed assets.

Although inventory management can be important in many situations, itcan be absolutely essential for mission critical assets used in adeployed context. For example, a soldier deployed in an operationalenvironment can be assigned a firearm, ammunition, chemical gear, acommunication device, and the like, each of which is needed to performthe soldier's mission. When the soldier lacks one or more of thesemission critical assets, either his life is in danger or his missionobjectives are unable to be accomplished. In many instances, the missioncritical assets carried by one soldier may be redundant to assetscarried by another soldier. The ability to rapidly determine when onesoldier lacks a mission critical asset and to reequip that soldier usinga surplus asset held by another soldier could be determinative to thesuccess of a military mission. Current inventory management systems donot provide for the dynamic redistribution of assets. Further, currentinventory management systems to not permit real-time deployed assetmonitoring.

Similar situations exist outside a military context. For example, teamsof power repair personnel involved in post-disaster power restorationefforts can have a number of assets, such as transformers, power cables,tools, and the like that are mission critical assets for restoringpower. In another example, theater costumes, prompts, sound equipment,can be considered mission critical assets for an entertainment event. Inyet another example, a corporation can have a limited number of mobilemission critical assets, such as notebook computers, projection devices,marketing material, support equipment, and the like, which are notalways available when needed, the lack of which can cause essentialbusiness deals to fall through. In still another example, blood suppliesof various kinds can be a mission critical asset for a network ofhospitals or for deployed Red Cross teams treating disaster victims.Accordingly, many contexts exist where assets are deployed, and wherethese assets are needed to perform a mission or to accomplish anobjective.

SUMMARY OF THE INVENTION

A deployed asset solution is disclosed herein where assets areassociated with location tags that are used for asset location anddistribution. More specifically, location tags, such as Radio FrequencyIdentification (RFID) tags, can be attached to portable assets. Theseassets can be assigned to people, who carry computing devices capable ofscanning for the RFID tags. The computing devices can also include awireless transceiver for exchanging digital information over a wirelessnetwork and a Global Positioning System (GPS) receiver for determiningasset locations. The tag scanner can continuously poll a scanning regionfor nearby location tags to determine if a person possesses those assetswhich the person should have. Inventory and positioning information canbe conveyed from multiple asset scanning devices to an inventory controlserver. The inventory control server can dynamically redistributeattributes according to mission needs. The inventory control server canalso provide decision makers with accurate, updated informationregarding deployed assets and their locations.

This information can be used to help decision makers establish policiesand construct missions, which are able to be reasonably accomplishedwith available resources. The solution can also provide real timeupdates for situation assessment purposes.

The present invention can be implemented in accordance with numerousaspects consistent with material presented herein. For example, oneaspect of the present invention can include a dynamic inventorymanagement method. The method can include the step of attaching alocation tag to a deployable asset. A mobile entity can be associatedwith the location tag. A tag scanner can scan for location tags within arange of the tag scanner. Data can be conveyed from the tag scanner to acommunicatively linked inventory control system. The scanning andconveying steps can be repeated to dynamically update the inventorycontrol system.

Another aspect of the present invention can include an asset managementsystem that includes deployed assets, at least one tag scanner, at leastone communication hub, and an inventory control server. The deployedassets can be associated with location tags. The tag scanner canperiodically scan a region to discover the location tags within theregion. The location communication hub can be linked to the tag scannerand can wirelessly communicate asset information obtained from the tagscanner and the location tags to the remotely located inventory controlserver. The inventory control server can continuously update an assetdatabase with information provided by one or more location communicationhubs.

It should be noted that various aspects of the invention can beimplemented as a program for controlling computing equipment toimplement the functions described herein, or a program for enablingcomputing equipment to perform processes corresponding to the stepsdisclosed herein. This program may be provided by storing the program ina magnetic disk, an optical disk, a semiconductor memory, or any otherrecording medium. The described program can be a single program or canbe implemented as multiple subprograms, each of which interact within asingle computing device or interact in a distributed fashion across anetwork space.

It should also be noted that the methods detailed herein can also bemethods performed at least in part by a service agent and/or a machinemanipulated by a service agent in response to a service request.

BRIEF DESCRIPTION OF THE DRAWINGS

There are shown in the drawings, embodiments which are presentlypreferred, it being understood, however, that the invention is notlimited to the precise arrangements and instrumentalities shown.

FIG. 1 is a schematic diagram of a system for real time inventorymanagement of deployed assets in accordance with an embodiment of theinventive arrangements disclosed herein.

FIG. 2 is a schematic diagram of a chain of command inventory managementsystem in accordance with an embodiment of the inventive arrangementsdisclosed herein.

FIG. 3 is a flow chart of a method for managing deployable assets inaccordance with an embodiment of the inventive arrangements disclosedherein.

FIG. 4 is a method for deployed asset management within a militarycontext in accordance with an embodiment of the inventive arrangementsdisclosed herein.

FIG. 5 is a flow chart of a method, where a service agent can configurea system that uses location tags with deployed assets for inventorypurposes in accordance with an embodiment of the inventive arrangementsdisclosed herein.

DETAILED DESCRIPTION OF THE INVENTION

FIG. 1 is a schematic diagram of a system 100 for real time inventorymanagement of deployed assets in accordance with an embodiment of theinventive arrangements disclosed herein.

System 100 includes tagged items 110-114, each having a location tag120-124 that can be read by tag scanner 125. The tag scanner canintermittently communicate with the tags 120-124 so that informationabout which tags 120-124 are proximate to tag scanner 125 is constantlyupdated. A designated mobile entity 140 can carry or be equipped witheach tagged item 110-114 and/or tag scanner 125. Information from taggedscanner 125 can be conveyed over communication link 170 to locationcommunication hub 130. The location communication hub 130 can beassociated with a position detection device 132.

The communication hub 130 can communicate with inventory control server150 via network 172. Inventory control server 150 can provide real timeor near real time inventory updates to management consoles 160-164 vianetworks 174-178.

In one embodiment, the inventory information provided by the inventorycontrol server 150 can be sanitized for different security levels. Forexample, network 174 can be a Non-classified Internet Protocol RouterNetwork (NIPRNET) compliant network over which unclassified, butsensitive information can be exchanged between server 150 and console160. Network 176 can be a Secret Internet Protocol Router Network(SIPRNET) compliant network over which secret information can besecurely conveyed. Network 178 can be a Joint Worldwide IntelligenceCommunications System (JWICS) compliant network over which TopSecret/Sensitive Compartmented Information (TS/SCI) can be securelyconveyed. Networks 174-178 are not limited in this regard, however, andcan represent any network over which carrier waves including digitallyencoded information can be conveyed.

Each tagged item 110-114 can be a mobile asset. Tagged items 110-114 canbe portable items carried by a user as well as semi-fixed items attachedto mobile vehicles. The tagged items 110-114 can include missioncritical assets. A mission critical asset is an asset which if lost isable to cause a mission or operation to fail or be aborted. For example,mission critical assets for a combat soldier can include a night visionscope, one or more firearms, ammunition clips, explosive devices,communication gear, and the like.

Each tagged item 110-114 can be associated with a location oridentification tag 120-124. The identification tag 120-124 canwirelessly communicate with tag scanner 125. Each tag 120-124 caninclude active, semi-active, and/or passive mechanisms used to ascertainlocations and/or information about an associated tagged item 110-114.These passive and active mechanisms can include transponders, wirelesstransceivers, processors, electronic memory spaces, and the like.

In one embodiment, each location tag 120-124 can be implemented as aRadio Frequency Identification (RFID) tag. Each tag 120-124 can be codedfor and attached to a tagged asset 110-114. Whenever the tagged item110-114 is within range of tag scanner 125, the tag scanner 125 can readthe information encoded within the tag 120-124.

The invention is not to be construed as limited to the utilization ofRFID tags, however, and other embodiments are contemplated. For example,a wireless personal area network (PAN) can be established between eachtag 120-124 and the tag scanner 125 through which information can bewirelessly conveyed. The PAN can utilize any of a variety oftechnologies, such as BLUETOOTH, WIFI (802.11 family of protocols), andZIGBEE.

Configuration specifics for the tag scanner 125 can be dependent uponthe technology utilized for the location tags 120-124. Generally, tagscanner 125 can be a computing device configured to determine aproximate location for each of the tags 120-124.

In one embodiment, the tag scanner 125 can be a computing device capableof performing rudimentary inventory operations. For example, each taggeditem 110-114 can be associated with a different soldier in a unit, whichis within range of tag scanner 125. Particular soldiers can carriersurplus items 110-114. The tag scanner 125 can automatically detectwhenever one soldier no longer carries a required tagged item 110-114and can responsively notify the soldier that he/she lacks a necessaryitem. The tag scanner 125 can also determine a solder carrying areplacement item as a surplus item, and can coordinate the transfer ofthe surplus item to the solder that lacks the tagged item 110-114.

For instance, one soldier can be running low on ammunition, and the tagscanner 125 (capable of reading magazine utilization from tags 120attached to ammunition magazines) can prompt a nearby soldier havingexcess ammunition to provide the lacking soldier with a portion of thesurplus ammunition.

The tag scanner 125 can exchange with the location communication hub 130over link 170. In one embodiment, the tag scanner 125 and location hub130 can be implemented as one integrated device. In another embodiment,the tag scanner 125 can be separate from, but linked to the locationcommunication hub 130. For example, the tag scanner 125 can include aBLUETOOTH or WIFI transceiver that communicates with the locationcommunication hub 130. Location communication hub 130 can include asatellite uplink or other network connection for exchanging data withthe inventory control server 150.

Each tagged item 110-114 and/or the tag scanner 125 can be associated orassigned to a mobile entity 140. The mobile entity 140 can include ahuman being, a vehicle, an automated machine (such as a drone or robot),and the like. In one embodiment, each mobile entity 140 can have alocation tag (not shown) associated with them, which can be tracked bythe tag scanner 125. For example, a soldier can have an RFID tagembedded under his/her skin or located inside his/her footwear, whichcan be used to identify and locate the soldier. In another example, ahigh mobility multipurpose wheeled vehicle (HMMWV or HUMV) can be amobile entity 140 that includes a location tag (not shown) that can betracked using the tag scanner 125.

The location communication hub 130 can be a device that receivesinformation from one or more tag scanner 125 and communicates thisinformation to the inventory control server 150 via network 172. Thelocation communication hub 130 can identity a relative geographicalposition for each tagged item 110-114, mobile entity 140, and tagscanner 125, as well as inventory status information about each. Thepositioning information can be obtained from one or more positiondetection devices 132. A position detection device 132 can include aglobal positioning system (GPS) or other positioning device, such as along range navigation (LORAN) device.

Additionally, position detection devices (not shown) can be embeddedwithin tag scanner 125 and mobile entity 140. The position detectiondevices can determine an absolute location or a relative location. Forexample, if multiple tag scanners 125 are distributed in a geographicalarea, each having a known location, a relative location of each of thelocation tags 120-124 can be determined automatically usingtriangulation techniques.

An inventory control server 150 can dynamically manage tagged items110-114. The deployed assets managed by the inventory control server 150can include tagged and untagged assets. For example, in one embodiment,only mission critical assets are tagged, where other assets havingrelatively less importance can be tracked using conventional techniques.Conventional techniques can require that data base information bemanually entered into a computing device. In a hybrid environment havingtagged 110-114 and non-tagged assets, information about the non-taggedinventory assets can be inferred from the tagged items 114. For example,if jeeps are tagged items 110-114 that are used to transport untaggedassets, then locations of the transported untagged assets can beinferred by the inventory control system 150 base upon the jeeplocations.

The inventory management consoles 160-164 can be management consolesused to oversee, direct, and plan a deployed operation. For example,inventory management console 162 can be used by a logistics support unitto direct supplies to deployed units. Console 164 can be used by battlestaff to plan and coordinate operational missions. Console 160 can be amedia communication system that is used to provide situational updates(unclassified) to news media organizations about a current operation.

It should be appreciated that although the examples presented above arelargely military examples, the present invention is not limited tomilitary contexts. Instead, the invention can be utilized for dynamic,real time inventory management in any circumstance where such inventorymanagement is beneficial.

For example, a disaster recovery team can utilize the location tags120-124 to tag disaster recovery assets, such as potable water, fuel,blankets, generators, transformers, repair trucks, and the like. Usingtagged assets, a disaster recovery coordinator can properly anddynamically distribute assets to those areas where the need is highest.For instance, multiple deployed power repair trucks, each having powerrepair supplies, can share repair resources with one another. Therefore,a repair truck in need of a transformer (tagged item 110-114 in thisexample) to repair a down power grid, can quickly acquire thetransformer from a nearby repair truck having surplus transformers.

In another example, each float in a large parade can include locationtags 110-114 indicating supply levels for the float. Supply levels caninclude vehicle fuel, water and food for float personnel, and paradehandouts. Whenever any float in the parade begins to run short onsupplies, supplies can be dynamically transferred from other floatshaving surplus supplies and/or supplies can be acquired from supplydepots.

FIG. 2 is a schematic diagram of a chain of command inventory managementsystem 200 in accordance with an embodiment of the inventivearrangements disclosed herein. System 200 can be one configuration forsystem 100, where deployed assets are able to be dynamically managed inreal time and accessed by every level of a military organization.

In system 200, database 202 can be a centralized repository for deployedassets. An inventory control server 204 can access and update database202. Network controller 206 can control the exchange of informationbetween asset computing devices 221-229 and the inventory control server204. One or more satellites 210 can be used to exchange information fromremotely located ones of the computing devices 221-229 and the networkcontroller 206.

Additional network resources (not shown), such as Internet, NIPRNET,SIPRNET, and JWICS resources are contemplated herein. It should also beappreciated that the communication pathways between each computingdevice 221-229 can be encrypted and masked to prevent an enemy fromeither intercepting communications and to obscure locations of mobileentities and tagged assets. In one embodiment, fake transmissions can beestablished to fool an enemy into thinking soldiers and tagged assetsare in locations, where none actually are, as part of an informationwarfare strategy to mislead enemy forces.

In system 200, the basic building block or unit of a militaryorganization can be a soldier 231. Each soldier 231 can carry acommunication hub 221 that is optionally equipped with a GPS receiver.The communication hub 221 can include a wireless transceiver and a tagscanner. Each mission critical resource associated with the soldier 231can be tagged. The hub 221 can periodically scan for tagged assetscarried by the soldier 231, reporting when a mission critical asset isabsent. The reporting can be performed to the soldier 231 as well as toany supervisor within the chain of command (232-239).

The next level in the chain of command can include a squadron 232 ofnine or ten soldiers lead by a sergeant. The squadron device hub 222 canmonitor all tagged assets of the squadron and can automatically suggestnew asset distributions within the squadron based upon surpluses anddeficiencies. In one embodiment, no soldier level hub 221 may benecessary, since the squadron level hub 222 may have sufficient scanningrange to detect location tags of all tagged assets carried by soldiers231 in the squadron 232.

In another embodiment, each soldier 231 can carry a modified hub 221capable of exchanging information with the sergeant's (or squadron'scommunication person's) squadron level device 222. These devices 221-222can be physically identical devices having a soldier mode and a sergeantmode. The soldier mode can be a very low power mode, which onlycommunicates short distances to device 222. The sergeant mode canoperate on higher power and be capable of transmitting signals to otherdevices 222 operating in sergeant mode, and to one or more devices 223operating in a higher mode. Should something happen to the sergeant'sdevice 222, one of the other devices 221 can automatically be upgradedto sergeant mode to prevent communication lapses.

Above the squadron 232, is a platoon 233, which can consist of two tofour squadrons and which can be lead by a lieutenant. One platoon device223 can be set for lieutenant mode, which permits lieutenants toexchange asset information with one another. In one embodiment,information can be conveyed to another device 221-229 directly up anddown the chain of command, one level at a time. Information can also beexchanged among devices 221-229 at the same level within the chain ofcommand. Additionally, information can be exchanged directly with thenetwork controller 206.

In another embodiment, the devices 221-229 when taken together form acooperative network capable of communicating with the mainframe 204, solong as one or more devices 221-229 linked to each other is also linkedto the network controller 206. Accordingly, system 200 can include aplurality of redundant communication pathways for indirectly exchangingdevice 221-229 inventory data with the network controller 206.

A company 238 can be led by a captain and can control multiple platoons233. A mobile workstation 225 can provide company level asset managementand command and control functions. The various platoons 233, each leadby a company captain, can be geographically distributed.

Multiple communication paths are possible for conveying information froma platoon device 223 to a company device 228. For example, platoon 234information can be conveyed from device 223 to network controller 206 todevice 228. In another example, platoon 234 information can be conveyedalong the cooperative computing path of device 223 to 224 to 225 to 226to 227 to 228. In this cooperative computing path, devices 224-227 canfunction as information routing devices may be restricted from accessingthe data which they route. It should be appreciated from this examplethat each device 221-229 from a technical perspective can becommunicatively linked to other devices 221-229 in a cooperative networkin a manner unrelated to the chain of command. Nevertheless, from afunctional perspective communications may only be permitted within thechain of command (typically one level up and one level down within thechain).

A battalion 224 can be led by a lieutenant colonel and can controlmultiple companies 238. The battalion 224 can include a mobileworkstation 224, which can be a more powerful version of communicationhub 221-223. For example, a mobile work station 224 can include commandand control software for visually mapping and dynamically assessing allforces commanded by the lieutenant colonel 234. The mobile workstation224 can also permit a lieutenant colonel 234 to configure logisticsupply channels and to convey additional assets from relatively safesupply depots to troop areas in need of those supplies.

A brigade 235 can be led by a colonel and can control multiplebattalions 234. A mobile workstation 225 can provide brigade level assetmanagement and command and control functions.

A division 237 can be led by a major general and can control multiplebrigades 235. A mobile workstation 227 can provide division level assetmanagement and command and control functions.

A corps 226 can be led by a lieutenant general and can control multipledivisions 237. A mobile workstation 227 can provide corps level assetmanagement and command and control functions.

An army 239 can be led by a general and can control multiple corps 226.A mobile workstation 229 can provide army level asset management andcommand and control functions.

FIG. 3 is a flow chart of a method 300 for managing deployable assets inaccordance with an embodiment of the inventive arrangements disclosedherein. Method 300 can be performed in the context of a system 100.

Method 300 can begin in step 305, where a location tag can be attachedto a deployable asset. In step 310, a mobile entity can be associatedwith the location tag. For example, the tag can be programmedspecifically for the mobile entity when the deployable asset is issuedto the mobile entity. In step 315, the method can loop from step 315 tostep 305, where additional assets can be tagged and associated with thesame or other mobile entities. Each mobile entity can be assignedmultiple tagged assets. Particular tagged assets can be shared amongmultiple mobile entities.

When no additional assets need to be tagged, the method can proceed tostep 320, where the assets can be deployed. In step 325, once deployed,a tag scanner can scan an area for tags. In step 330, a local system canprocess the tags found by the scanner and can optionally perform aprogrammatic action based on the results of the processing operation.For example, if the scanned tags indicate that one deployed asset ismissing, the mobile entity responsible for the deployed asset can benotified. In another example, other mobile devices equipped with tagscanners can be queried to determine if other scanners have identified alocation for the missing asset. If so, the asset can be conveyed to themobile entity to which the asset has been assigned.

In step 335, deployed asset data, including location information for theassets, can be conveyed to a communicatively linked inventory controlsystem. Additionally, step 335 can loop to step 325, where the tagscanner can again scan for tags. It should be appreciated that thescanning for tags can be a continuously repeated process. The conveyingof data to the inventory control system need not follow the same cyclethat the scanner follows. For example, the method 300 can be configuredso that data is only conveyed to the inventory control system every tenscan cycles.

In step 340, the inventory control system can determine if assets areneeded at any of the deployed locations. If not, the method can skip tostep 335, where inventory data can be optionally processed and reportedto management consoles. If assets are needed at one or more deployedlocations, the method can progress from step 340 to step 345, where theinventory management console can determine if a needed asset isavailable. In step 350, if an asset is available, that asset can beredeployed from a current location to the location of the mobile entityin need. The replacement asset can be procured from a supply depot orfrom another mobile entity having a surplus asset or having a lesserneed for the asset.

In step 355, the inventory data of the inventory control system can besummarized, data mined, and otherwise analyzed. For example, theinventory data can be summarized for a high level operations commander.The method can loop from step 355 to step 340, where new information canbe conveyed from a deployed location to the inventory control system.The inventory control system can constantly receive updated assetinformation from deployed locations.

FIG. 4 is a method 400 for deployed asset management within a militarycontext in accordance with an embodiment of the inventive arrangementsdisclosed herein.

Method 400 can begin in step 405, where a soldier can be issued missioncritical assets and equipment having attached RFID tags. The soldier canalso be issued one or more mobile computing devices for monitoring andcommunicating inventory status of issued items. In step 410, the soldiercan enter a quiet chamber where the RFID tags can be associated with thesoldier. In step 415, the soldier can press an enablement button on themobile device to link the device to the tagged assets. In step 420, themobile device can compile a list of all RFID enabled equipment assignedto the soldier.

In step 425, the soldier can be deployed, where his inventory assets andposition are constantly being updated and transmitted to an inventorycontrol system. In step 430, the mobile device can poll for all RFIDtags within range of an RFID scanner. In step 435, when the equipmentassigned to the soldier is located, the method can loop to step 430,where another scan for equipment can be performed after a configureddelay period.

If in step 435, expected equipment is not found, the method can proceedto step 440, where a new list of items actually possessed by the soldiercan be generated. In step 445, the soldier can be optionally informedthat one or more assets are missing.

When the mobile device discovers tags associated with other soldiers, anaction can be optionally taken. For example, the devices carried bythose other soldiers can be queried to determine whether the othersoldiers have lost their equipment, or whether the soldiers areproximately located the discovered asset. In step 450, when additionaltagged assets are found that are not associated with a proper owner, thesoldier can be optionally informed that additional assets are located inthe soldier's vicinity. If the soldier recovers the asset, his inventorylist can be automatically updated. In step 455, the inventory controllist of the soldier can be conveyed to a local communication hub. Thelocal communication hub can convey the control list to a remotelylocated inventory control server. Every time an asset anomaly isdetected, the method can perform steps 440-455.

FIG. 5 is a flow chart of a method 500, where a service agent canconfigure a system that uses location tags with deployed assets forinventory purposes in accordance with an embodiment of the inventivearrangements disclosed herein. Method 500 can be preformed in thecontext of system 100.

Method 500 can begin in step 505, when a customer initiates a servicerequest. The service request can be a request for a service agent toestablish a new dynamic asset management system for deployed assets. Theservice request can also be a request to troubleshoot a problem with aninventory tracking system or to provide an enhancement for an existinginventory tracking system.

In step 510, a human agent can be selected to respond to the servicerequest. In step 515, the human agent can analyze a customer's currentsystem and can develop a solution. The solution can include theacquisition and deployment of additional hardware, such as tag scanners,communication hubs, and location tags.

In step 520, the human agent can use one or more computing devices toperform or to cause the computer device to perform the steps of method300. In optional step 525, the human agent can configure a computingdevice of the customer in a manner that the customer or clients of thecustomer can perform one or more steps of method 300 in the future. Forexample, the service agent can load and configure software and hardwareso that deployed assets will be automatically detected by a tag scanner,which conveys information to an inventory control server. In step 530,the human agent can complete the service activities.

It should be noted that while the human agent may physically travel to alocation local to adjust the customer's computer or application server,physical travel may be unnecessary. For example, the human agent can usea remote software agent to remotely manipulate the customer's computersystem and/or a location communication hub.

The present invention may be realized in hardware, software, or acombination of hardware and software. The present invention may berealized in a centralized fashion in one computer system or in adistributed fashion where different elements are spread across severalinterconnected computer systems. Any kind of computer system or otherapparatus adapted for carrying out the methods described herein issuited. A typical combination of hardware and software may be a generalpurpose computer system with a computer program that, when being loadedand executed, controls the computer system such that it carries out themethods described herein.

The present invention also may be embedded in a computer programproduct, which comprises all the features enabling the implementation ofthe methods described herein, and which when loaded in a computer systemis able to carry out these methods. Computer program in the presentcontext means any expression, in any language, code or notation, of aset of instructions intended to cause a system having an informationprocessing capability to perform a particular function either directlyor after either or both of the following: a) conversion to anotherlanguage, code or notation; b) reproduction in a different materialform.

This invention may be embodied in other forms without departing from thespirit or essential attributes thereof. Accordingly, reference should bemade to the following claims, rather than to the foregoingspecification, as indicating the scope of the invention.

1. A computer program product in a machine-readable storage recordingmedium having stored thereon, a computer program having a plurality ofcode sections, said code sections executable by a machine, said computerprogram product comprising: a code section operable by a machine toattach a location tag to a deployable asset; a code section operable bya machine to associate a mobile entity with the location tag; a codesection operable by a machine to scan at a tag scanner for location tagswithin a range of the tag scanner; a code section operable by a machineto convey data from the tag scanner to a communicatively linkedinventory control system; and a code section operable by a machine torepeat the codes sections to scan and convey to dynamically update theinventory control system, wherein the inventory control system is linkedto a plurality of consoles via a plurality of networks, wherein theplurality of networks have different security levels, and wherein theinventory control system adjusts content to a highest allowable securitylevel corresponding to a carrier network when conveying data to theconsoles via the networks.
 2. An asset management system comprising: aplurality of deployed assets, each deployed asset associated with alocation tag; at least one tag scanner configured to periodically scan aregion to discover the location tag of each of the deployed assetswithin the region; at least one location communication hub linked to theat least one tag scanner configured to wirelessly communicate assetinformation obtained from the tag scanner and each location tag to atleast one remotely located inventory control server; and the inventorycontrol server configured to continuously update an asset database withinformation provided by the at least one location communication hub,wherein the inventory control server is linked to a plurality ofconsoles via a plurality of networks, wherein the plurality of networkshave different security levels, and wherein the inventory control serveradjusts content to a highest allowable security level corresponding to acarrier network when conveying data to the consoles via the networks. 3.The asset management system of claim 2, wherein each deployed asset is amission critical asset assigned to a soldier, and wherein each locationtag is an RFID tag.
 4. The asset management system of claim 2, whereinthe at least one location communication hub further comprises a positiondetection device, wherein the at least one communication hub wirelesslycommunicates position information of each deployed asset along with theasset information.
 5. The asset management system of claim 2, whereinthe inventory control server is configured to dynamically determine adeficient one of the plurality of assets, wherein a deficient asset isan asset assigned to a mobile entity, which is not detected by the tagscanner located near the mobile entity, wherein the inventory controlserver is configured to dynamically determine a surplus asset capable ofreplacing the deficient asset, and wherein the inventory control serverdynamically reassigns the surplus asset to the mobile entity.