System and method for tracking objects

ABSTRACT

A computing system can include a radio transceiver and tracking manager software for tracking the location of objects such as tools. Radio frequency identification tags are attached to the objects and can communicate with the radio transceiver. During an initial registration process, the tracking manager software sends an initial registration signal to each object so that the object can be identified in a registered objects file. In one instance, the tracking manager software subsequently sends periodic interrogation signals to the objects to confirm that the objects are within a certain proximity. In another instance, after completing a task a worker can check-in each object wherein the tracking manager software sends interrogation signals to the objects to confirm that all of the objects are accounted for.

RELATED APPLICATIONS

The present application is a continuation application of and claimspriority to U.S. patent application Ser. No. 17/223,279, filed Apr. 6,2021, the entire content of which is incorporated herein by reference.

TECHNICAL FIELD

Embodiments of the technology relate generally to using radio frequencyidentifying tags for tracking the proximity of objects.

BACKGROUND

Oil and gas extraction often involves workers performing work atsubstantial heights. As one example, oil and gas extraction typicallyrequires rigs that support drilling and extraction equipment. The rigsare used for both on-shore and off-shore drilling and can range from 30to 80 feet tall as measured from the base of the rig. The rigs caninclude many parts that require maintenance, repair and replacement,which is handled by workers who must ascend the rigs. The workers oftenbring tools or other equipment up into the rigs to perform tasks and onecommon risk involves workers forgetting the tools or other equipment upin the rig. An unsecured tool or piece of equipment left at a height ina rig poses a danger in that if the unsecured tool or piece of equipmentfalls from a substantial height it can injure people located below.Dropped objects striking workers is one of the more common types ofinjuries encountered on the oil and gas rigs. Similar risks can exist atother sites such as refineries where workers often perform work onstructures at significant heights.

The Occupational Health and Safety Administration (“OSHA”) of the U.S.Department of Labor sets certain safety standards to try to prevent therisks associated with dropped objects in work environments. For example,OSHA standard 1926.759 sets guidelines for protection from fallingobjects. To comply with safety guidelines and address the risk posed byfalling objects in the oil and gas industry, various approaches toimproving safety have been attempted. For example, prior approaches haveused tethers attached to tools and holsters for securing tools. However,these prior approaches can be subject to human error, such as whenworkers are fatigued or distracted.

Accordingly, it would be advantageous to have a system that assists theworker in keeping track of tools and other equipment that are used inperforming work at significant heights. Furthermore, it would beadvantageous to have a system that prevents tools and other equipmentfrom being forgotten on tall structures where they can pose a danger.

SUMMARY

The present disclosure is generally directed to an improved system andmethod for tracking objects. In one example embodiment, the presentdisclosure is directed to a computing system that communicates withradio frequency identification (“RFID”) tags attached to tools. Thecomputing system includes a display, a transceiver, memory storingcomputer-readable instructions, and one or more processors configured toexecute the computer-readable instructions. The computer-readableinstructions can be configured to transmit by the transceiver an initialregistration signal to the RFID tag attached to the tool and receive aregistration response signal from the RFID tag, wherein the registrationresponse signal comprises a tool identifier. A tracking manager softwareapplication executing on the computing system can store the toolidentifier in a registered tools file and can display the toolidentifier on the display. After a predetermined time interval, thetransceiver transmits an interrogation signal to the RFID tag attachedto the tool and the tracking manager software application evaluates thetype of the status response signal received from the RFID tag attachedto the tool. If the tracking manager software application determines,based on the type of the status response signal, that the tool is beyonda perimeter distance from the computing system, the tracking managerwill provide an alert.

In the foregoing example, the computing system can be a smart phone andthe transceiver can be a radio frequency transceiver that attaches tothe smart phone. The tool identifier that is received can include atleast one of a tool name or a tool serial number. Furthermore, the alertthe tracking manager provides can be at least one of an audible alertemitted by the computing system or a visible alert displayed on thedisplay.

In the foregoing example, the one or more processors can be furtherconfigured to execute the computer-readable instructions to: determine,by the tracking manager, that the type of the status response signal isan absence of a response from the radio frequency tag of the tool; andprovide, by the tracking manager, the alert from the computing system.

In the foregoing example, the one or more processors can be furtherconfigured to execute the computer-readable instructions to: determine,by the tracking manager, that a strength of the status response signalfrom the radio frequency tag of the tool fails to meet a thresholdsignal strength; in response to determining the strength of the statusresponse signal from the radio frequency tag of the tool fails to meetthe threshold signal strength, determine, by the tracking manager, thatthe tool is beyond the perimeter distance from the computing system; andprovide, by the tracking manager, the alert from the computing system.

In the foregoing example, the one or more processors can be furtherconfigured to execute the computer-readable instructions to: determine,by the tracking manager, that a strength of the status response signalfrom the radio frequency tag of the tool meets a threshold signalstrength; in response to determining the strength of the status responsesignal from the radio frequency tag of the tool meets the thresholdsignal strength, determine, by the tracking manager, that the tool iswithin the perimeter distance from the computing system; and provide, bythe tracking manager, a notification via the computing system indicatingthe tool is secured.

In another example embodiment, the present disclosure is directed to acomputing system that communicates with RFID tags attached to toolswherein the RFID tags contain a power source and can be referred to asactive RFID tags. The computing system includes a display, atransceiver, memory storing computer-readable instructions, and one ormore processors configured to execute the computer-readableinstructions. The computer-readable instructions can be configured totransmit by the transceiver an initial registration signal to the RFIDtag attached to the tool, the initial registration signal causing theRFID tag to change from an inactive state to an active state. Inresponse, the transceiver receives a registration response signal fromthe RFID tag, wherein the registration response signal comprises a toolidentifier. A tracking manager software application executing on thecomputing system can store the tool identifier in a registered toolsfile and can display the tool identifier on the display. The transceiverof the computing system can receive a periodic status signal from theRFID tag attached to the tool. The tracking manager can evaluate astrength of the periodic status signal and determine, based on thestrength of the signal, that the tool is beyond a perimeter distancefrom the computing system, in which case the tracking manager providesan alert via the computing system.

In the foregoing example, the RFID tag can comprise an antenna, anintegrated circuit, and a power source. The active state of the RFID tagcan cause the RFID tag to emit the periodic status signal.

In the foregoing example, the one or more processors can be furtherconfigured to execute the computer-readable instructions to: store, bythe tracking manager in memory, the strength of the periodic statussignal for a plurality of periodic status signals; evaluate, by thetracking manager, a change in strength of the plurality of periodicstatus signals over time; and provide a second alert, by the trackingmanager via the computing system, in response to the change in strengthof the plurality of periodic status signals over time exceeding athreshold value.

In the foregoing example, the one or more processors can be furtherconfigured to determine, by the tracking manager, that the strength ofthe periodic status signal from the radio frequency tag of the toolmeets a threshold signal strength; in response to determining thestrength of the periodic status signal from the radio frequency tag ofthe tool meets the threshold signal strength, determine, by the trackingmanager, that the tool is within the perimeter distance from thecomputing system; and provide, by the tracking manager, a notificationvia the computing system indicating the tool is secured.

In the foregoing example, the computing system can be a smart phone andthe transceiver can be a radio frequency transceiver that attaches tothe smart phone. The tool identifier that is received can include atleast one of a tool name or a tool serial number. Furthermore, the alertthe tracking manager provides can be at least one of an audible alertemitted by the computing system or a visible alert displayed on thedisplay.

In yet another example embodiment, the present disclosure is directed toa computing system that communicates with RFID tags attached to toolsfor the purpose of registering and checking-in tools for tracking of thetools. The computing system includes a display, a transceiver, memorystoring computer-readable instructions, and one or more processorsconfigured to execute the computer-readable instructions. Thecomputer-readable instructions can be configured to receive an initiallogin for a worker and transmit by the transceiver an initialregistration signal to the RFID tag of the tool. The computing systemcan receive a registration response signal from the RFID tag wherein theregistration response signal comprises a tool identifier. A trackingmanager software application can store the tool identifier in aregistered tools file and can display the tool identifier on thedisplay. At a later point in time, the computing system can receive asubsequent login for the worker. The computing system can transmit bythe transceiver an interrogation signal to the RFID tag of the tool andreceive a response check-in signal comprising a check-in toolidentifier. The tracking manager can store the check-in tool identifierin the registered tools file and provide an alert if the tool identifierin the registered tools file does not have a matching check-inidentifier.

In the foregoing example, the computing system can be located in avehicle. The tool identifier can comprise at least one of a tool name ora tool serial number. Furthermore, the alert the tracking managerprovides can be at least one of an audible alert emitted by thecomputing system or a visible alert displayed on the display. In theforegoing example, the tracking manager can provide a clearednotification if the tool identifier in the registered tools file matchesthe check-in tool identifier.

The foregoing embodiments are non-limiting examples and other aspectsand embodiments will be described herein. The foregoing summary isprovided to introduce various concepts in a simplified form that arefurther described below in the detailed description. This summary is notintended to identify required or essential features of the claimedsubject matter nor is the summary intended to limit the scope of theclaimed subject matter.

BRIEF DESCRIPTION OF THE DRAWINGS

The accompanying drawings illustrate only example embodiments of systemsand methods for tracking objects and therefore are not to be consideredlimiting of the scope of this disclosure. The principles illustrated inthe example embodiments of the drawings can be applied to alternatesystems and methods for a tracking objects. Additionally, the elementsand features shown in the drawings are not necessarily to scale,emphasis instead being placed upon clearly illustrating the principlesof the example embodiments. Certain dimensions or positions may beexaggerated to help visually convey such principles.

FIG. 1 illustrates an example rig used for drilling for hydrocarbons.

FIG. 2 is a schematic view of a system for tracking objects inaccordance with an example embodiment of the present disclosure.

FIG. 3 illustrates a method for tracking objects using the system ofFIG. 2 in accordance with an example embodiment of the presentdisclosure.

FIG. 4 is a schematic view of a system for tracking objects inaccordance with another example embodiment of the present disclosure.

FIG. 5 illustrates a method for tracking objects using the system ofFIG. 4 in accordance with an example embodiment of the presentdisclosure.

DETAILED DESCRIPTION OF EXAMPLE EMBODIMENTS

The example embodiments discussed herein are directed to methods andsystems for tracking objects used at heights, such as on rigs used fordrilling and extracting oil and gas. The example embodiments describedherein can provide an improved approach to tracking objects used on rigsso that the objects are less likely to be misplaced or forgotten on therig. As will be described further in the following examples, the methodsand systems described herein improve upon prior art approaches totracking objects used on rigs by reducing the opportunities for humanerror when working on a rig. The techniques described use RFID tags totrack the location of objects and a computing system to provide alertsto a worker when an object is out of range or unaccounted for. Thetechniques described herein eliminate the complications caused bytethers and holsters in prior art approaches to tracking objects.

The terms “tool” and “object” are used herein to describe a variety ofobjects and equipment that a worker might use when working on a rig.Examples of tools or objects can include, but are not limited to,hammers, wrenches, gripping tools, welding tools, measuring devices,fasteners, helmets, and eyeglasses.

In the following paragraphs, particular embodiments will be described infurther detail by way of example with reference to the drawings. In thedescription, well-known components, methods, and/or processingtechniques are omitted or briefly described. Furthermore, reference tovarious feature(s) of the embodiments is not to suggest that allembodiments must include the referenced feature(s).

Referring to FIG. 1, an example of a rig used for extractinghydrocarbons is illustrated. As is typical of rigs in the oil and gasindustry, the rig has considerable height and often times workers mustascend the rig to perform various tasks. As described previously, if anobject or tool is forgotten on the rig, it can present a danger topeople below if the object or tool falls from the rig. As also describesabove, the presence of unsecured objects at heights has been recognizedas a safety issue in the oil and gas industry as well as otherindustries and OSHA has established certain standards relating toreducing the likelihood of dropped objects.

In FIG. 1, an example drilling rig 100 is located on a pad that includesa first well 105 and a second well 110. The drilling rig 100 is disposedover the first well 105 and the wellhead 115 of the first well 105. Thedrilling rig 100 comprises a substructure 120, a drill floor 122, and amast 125 extending vertically above the drill floor 122. The examplewell 100 shown in FIG. 1 includes a service truck 130 located at thesite for performing work on the wells. As can be seen in FIG. 1, theheight of the drilling rig 100 is several times higher than the heightof the truck 130. Often times, workers will ascend the drilling rig 100and the mast 125 to perform work and will bring tools or other equipmentup into the rig 100 to perform the work. As explained previously, insome instances, workers can misplace or forget the tools or otherequipment brought up into the rig 100 and the tools or other equipmentare left behind at a height on the drilling rig 100. If such tools orequipment later fall from the drilling rig 100, they can present ahazard for people below. Accordingly, the following systems and methodsdescribed in connection with FIGS. 2-5 provide techniques for reducingthe risk of tools or objects being left behind on the drilling rig wherethey can present a hazard. While an example of a drilling rig isprovided in FIG. 1, it should be understood the techniques describedherein can apply to any type of rig or tall structure where a worker hasto ascend the structure with tools.

Referring now to FIGS. 2 and 3, an example system 200 and example method300 are illustrated for tracking the location of tools or objects usedin work on a rig. FIG. 2 shows an example computing system 220, such asa smart phone or other portable computing device that a worker can carryin a pocket or attach to a belt while performing work on a rig. Thecomputing system 220 can include, but is not limited to, one or moreprocessors 225, memory 240, a communications interface 230, andinput/output components 235. A bus (not shown) can allow the variouscomponents of the computing system 220 to communicate with one another.A bus can be one or more of any of several types of bus structures,including a memory bus or memory controller, a peripheral bus, anaccelerated graphics port, and a processor or local bus using any of avariety of bus architectures. The components shown in FIG. 3 are notexhaustive, and in some embodiments, one or more of the components shownin FIG. 3 may not be included in an example system. Further, one or morecomponents shown in FIG. 3 can be rearranged.

The communications interface 230 can transmit and receive signals viasignal transfer links, including but not limited to signals sent andreceived from a transceiver 250. In some example embodiments thetransceiver can be integrated into the computing system 220, while inother embodiments the transceiver 250 can be a separate component thatis coupled to the computing system 220. The transceiver can be a radiofrequency transceiver that communicates at or about 8 MHz as is oftenused for communications with RFID tags. In some example embodiments, thecommunications interface 230 enables communications with other wirelesscomputing devices.

In one or more example embodiments, the one or more processors 225execute software instructions stored in memory 240. The memory 240includes one or more cache memories, main memory, and/or any othersuitable type of memory. The memory 240 can be a persistent storagedevice (or set of devices) that stores software and data used in theoperation of the computing system 220. As illustrated in the example ofFIG. 2, the memory 240 can store an operating system 242, a trackingmanager software application 246, and data, which can includeidentifiers of registered objects or tools. It should be understood thatmemory 240 can also store other software algorithms and data. Forexample, data associated with signals received from RFID tags that areattached to tools can also be stored in memory. Stored data can alsoinclude any data associated with the computing system 220 (including anycomponents thereof), any measurements taken by sensors, time measured bya timer, adjustments to an algorithm, threshold values, userpreferences, default values, results of previously collected or analyzeddata, and/or any other suitable data. The tracking manager softwareapplication 246 as well as other algorithms stored in memory 240 cancomprise computer-executable instructions for performing a variety ofmethods, including the methods illustrated in FIG. 3. The trackingmanager software application 246 and other algorithms can also executecomputer-readable instructions based on information received via thecommunications interface 230, from data entered by a user via theinput/output interface 235, or based on static variables that areprogrammed into the computing system 220.

The one or more processors 225 include a hardware processor that can bean integrated circuit, a central processing unit, a multi-coreprocessing chip, an SoC, a multi-chip module including multiplemulti-core processing chips, or other hardware processor in one or moreexample embodiments. The processor 225 is known by other names,including but not limited to a computer processor, a microprocessor, anda multi-core processor. In alternate embodiments, the one or morehardware processors can be replaced by other logic devices such as oneor more field programmable gate arrays (FPGAs). Using FPGAs and/or othersimilar devices known in the art allows the computing system 220 (orportions thereof) to be programmable and function according to certainlogic rules and thresholds without the use of a hardware processor.

The one or more I/O interfaces 235, such as a keyboard, display, ortouch screen interface, allow a user to enter commands and informationto the computing system 220, and also allow information to be presentedto the user and/or other components or devices.

Also shown in FIG. 2 are two example tools, a hammer 260 and a wrench270. The tools are examples of the types of tools a worker might bringup onto a rig, but it should be understood that other types of tools andobjects can also be tracked and many more tools and objects can betracked using computing system 220. The hammer 260 includes an RFID tag161 and the wrench 270 includes an RFID tag 271. The RFID tags can beattached to an outer portion of the tool or may be attached to an innerportion of the tool where they are less obtrusive. The RFID tags can bepassive RFID tags that include an integrated circuit and antenna thatrespond to an interrogation signal. Alternatively, the RFID tags can beactive RFID tags that include an integrated circuit, an antenna, and apower source that enables the active RFID tag to emit an RF signalwithout being prompted by an interrogation signal. As illustrated inFIG. 2, the transceiver 250 can communicate with the RFID tags attachedto the tools using radio frequency signals so that the computing system220 can track the tools.

Referring to FIG. 3, example method 300 for operating the computingsystem 220 is illustrated. Although referred to in the singular, method300 embodies multiple alternative methods as will be described further.It should be understood that many of the steps illustrated in method 300are performed by or initiated by computer-executable instructions storedin memory 240. Such computer-executable instructions can be generallyreferred to as the tracking manager software application 246, but itshould be understood that the computer-executable instructions can beorganized in one or many software modules.

Referring to step 310, before the computer system 220 can be used totrack tools, RFID tags must be applied to the tools. A unique tool nameor tool identifier is stored in the circuit of the RFID tag so that eachtool is uniquely identified. In step 315, the transceiver 250 is coupledwith the computing system 220. For example, if the computing device is asmart phone that does not have a dedicated transceiver that communicatesat the frequency used by the RFID tags, an external transceiver willneed to be coupled to the smart phone. Alternatively, step 315 can beomitted if the computing device has a dedicated transceiver forcommunicating with the RFID tags.

Before a worker ascends the rig with tools, the worker will complete aregistration process for the tools so that they can be tracked. In step320, the tracking manager software application 246 can trigger thetransceiver 250 to send an initial registration signal to the RFID tag261 of a tool 260. The initial registration signal will trigger the RFIDtag 261 on the tool 260 to respond and transceiver 250 receives aregistration response signal from the RFID tag 261 in step 325. Theregistration response comprises a tool identifier for the tool 260 and,in step 330, the tracking manager software application 246 executing onthe computing system can store the tool identifier in a registered toolsfile. If the worker has additional tools to be registered at step 335,the process of steps 320-330 can be repeated until all of the worker'stools are registered. In step 340, the tracking manager softwareapplication 246 can display on display screen 235 a name or otheridentifier for each of the tools that have been registered. The workercan review the list of registered tools to ensure that all of the toolsthe worker intends to bring up into the rig have been registered fortracking.

Once the worker ascends the rig, the computing system 220 can performthe tracking functions to ensure the worker does not leave behind a toolon the rig. In the case of passive RFID tags attached to the tools, instep 345, the tracking manager software application 246 prompts thetransceiver 250 to send periodic interrogation signals to the RFID tags.The frequency of the periodic interrogation signals can be predeterminedor can be selected in the tracking manager software application 246. Asnon-limiting examples, the frequency of the periodic interrogationsignals can be every second for real-time tracking, every few secondsfor near real-time tracking, every thirty seconds, or every two minutes.and the tracking manager software application evaluates the type of thestatus response signal received from the RFID tag attached to the tool.

The RFID tags will respond with a status response signal that isreceived at the transceiver 250 and the tracking manager softwareapplication 246, in step 355, evaluates the type of the status responsesignal. As one example, the tracking manager software application 246can compare the status response signal against the list of registeredtools 244 stored in memory 240 to confirm that the RFID tag attached toeach tool has provided a response. As another example, one type ofstatus response signal is the absence of a status response signalindicating that a tool's RFID tag failed to respond and may be out ofrange. As yet another example, the tracking manager software application246 can analyze the strength of the status response signal for an RFIDtag. If the strength of the status response signals from an RFID tagdiminish over time, it may be an indication that the worker hasmisplaced the tool and is gradually moving away from the tool. In step360, if the tracking manager software application 246 determines that atool has been misplaced, the tracking manager software application 246can provide an alert to the worker. For example, the alert can be anaudible alert emitted by a speaker 235 of the computing system 220. Inaddition or alternatively, the alert can be displayed on the display 235of the computing system 220. In another embodiment, if the trackingmanager software application 246 determines that the tool is within apredetermined perimeter of the computing system 220, based on thereceipt of the status response signal or the strength of the statusresponse signal, the tracking manager software application 246 canprovide an indication that the tool is accounted for or is secured.

If the RFID tags attached to the tools are active RFID tags, instead ofpassive RFID tags, method 300 can follow an alternate embodiment. Insuch an alternate embodiment, step 345 can be omitted because the activeRFID tags have their own power source and do not require aninterrogation signal in order to generate a response. In the alternateembodiment, when the worker ascends the rig with tools, such as thehammer 260 and wrench 270, the active RFID tags attached to the toolswill emit periodic status signals that are detected by the transceiver250. The periodic status signals can include a unique identifier foreach tool. As with the previously described passive RFID embodiment, thefrequency of the periodic status signals can be determined when theactive RFID tags are initialized and can vary from a second to a fewminutes. In step 350, the transceiver 250 provides the detected periodicstatus signals from the tools to the tracking manager softwareapplication 246. Steps 355 and 360 are performed in the same manner asdescribed previously for the passive RFID tag example. If the trackingmanager software application 246 determines that a tool is missing orbeyond a predetermined perimeter from the computing system 220, thecomputing system 220 can generate an alert. Alternatively, if thecomputing system 220 determines that the tool is accounted for, it anprovide such an indication.

Referring now to FIGS. 4 and 5, another example embodiment for trackingobjects or tools is illustrated. The example system 400 illustrated inFIG. 4 includes a computing system in the form of a ground-based reader420 that is used to track tools. The computing system 420 can bedisposed on a truck, vehicle or other equipment located at or near thebase of the rig so that it is in a convenient location for trackingtools used on the rig. The tools can be scanned at the ground-basedreader during a registration step before the worker ascends the rig andcan be scanned again during a check-in step when the worker returns fromthe rig. The computing system 420 includes one or more processors 425,communications interface(s) 430, input/output interfaces 435, and memory440. The memory 440 can comprise a tracking manager software application446, data in the form of tool identifiers 444 associated with registeredtools being tracked, an operating system 442, as well as otheralgorithms and data typically used in a computing system. The componentsof computing system 420 are substantially similar to the components incomputing system 220, except that in the example system 400, thecomputing system 420 is a ground-based system that remains at or nearthe base of the rig or a vehicle used to service the rig. Accordingly,the previous detailed description of the components of computing system220 of FIG. 2 applies to the similar components of computing system 420and will not be repeated.

The computing system 420 of system 400 also comprises a transceiver 450that is similar to the previously-described transceiver 250. Thetransceiver 450 communicates with RFID tags using radio frequencycommunications. The example system 400 shows two example tools, a hammer460 and a wrench 470. The hammer 460 includes RFID tag 461 and thewrench 470 includes RFID tag 471. As described in connection withexample system 200, the RFID tags can be located on an outer portion ofthe tools or in a less obtrusive inner portion of the tools. Thetransceiver 450 can communicate with RFID tags in order to track thelocation of the tools. In the ground-based registration and check-inapproach of system 400 and method 500, the RFID tags are preferablypassive RFID tags because there is no need for active RFID tags thatemit signals using a power source. However, active RFID tags are notprecluded from use in the embodiment of FIGS. 4 and 5.

Referring to FIG. 5, example method 500 for operating the computingsystem 420 is illustrated. Although referred to in the singular, method500 can embody multiple alternative methods as will be describedfurther. It should be understood that many of the steps illustrated inmethod 500 are performed by or initiated by computer-executableinstructions stored in memory 440. Such computer-executable instructionscan be generally referred to as the tracking manager softwareapplication 446, but it should be understood that thecomputer-executable instructions can be organized in one or manysoftware modules.

In step 510, RFID tags are applied to tools 460 and 470. In step 515,the ground-based reader computing device 420 receives a login from aworker who is registering tools in preparation to ascend a rig. Thetracking manager software application 446 can trigger the transceiver450 to send an initial registration signal to the RFID tag 461 of a tool460 in step 520. The initial registration signal will trigger the RFIDtag 461 on the tool 460 to respond and transceiver 450 receives aregistration response signal containing a tool identifier from the RFIDtag 461 in step 525. In step 530, the tracking manager softwareapplication 446 executing on the computing system (ground-based reader420) can store the tool identifier in a registered tools file 444. Ifthe worker has additional tools to be registered at step 535, theprocess of steps 520-530 can be repeated until all of the worker's toolsare registered. In step 540, the tracking manager software application446 can display on display screen 435 a name or other identifier foreach of the tools that have been registered. The worker can review thelist of registered tools to ensure that all of the tools the workerintends to bring up into the rig have been registered for tracking.

Once the tools are registered, the worker ascends the rig and performswork using the tools in step 545. After the worker completes the work onthe rig, the worker returns to the ground-based reader 420 to check inthe tools to ensure none have been left on the rig. In step 550, theworker logs back in to the ground-based reader so that the reader canretrieve the list of tools the worker previously registered. In step555, the tracking manager software application 446 prompts thetransceiver 450 to send an interrogation signal to the RFID tags on eachtool.

The RFID tags will respond with a response check-in signal that includesthe tool identifiers and that is received at the transceiver 450 in step560. The tracking manager software application 446, in step 565, storesthe received response check-in signals and compares them to the toolidentifiers stored during the initial registration step. If the trackingmanager software application 446 determines that a response check-insignal has not been received for any of the registered tool identifiers,in step 570, the tracking manager software 446 can generate an alert viathe ground-based reader indicating a tool is missing and may have beenleft on the rig. The alert can be an audible alert generated by aspeaker 435 and/or a visual alert on a display 435. In anotherembodiment, if the tracking manager software application 446 determinesthat all of the tools are accounted for, the application can generate areport confirming all of the tools have been returned from the rig.

For any figure shown and described herein, one or more of the componentsmay be omitted, added, repeated, and/or substituted. Accordingly,embodiments shown in a particular figure should not be consideredlimited to the specific arrangements of components shown in such figure.Further, if a component of a figure is described but not expressly shownor labeled in that figure, the label used for a corresponding componentin another figure can be inferred to that component. Conversely, if acomponent in a figure is labeled but not described, the description forsuch component can be substantially the same as the description for thecorresponding component in another figure.

With respect to the example methods described herein, it should beunderstood that in alternate embodiments, certain steps of the methodsmay be performed in a different order, may be performed in parallel, ormay be omitted. Moreover, in alternate embodiments additional steps maybe added to the example methods described herein. Accordingly, theexample methods provided herein should be viewed as illustrative and notlimiting of the disclosure.

Referring generally to the examples herein, the computing systems cancomprise a single integrated system or a combination of components ormodules that are coupled together. Regarding the RFID tags, they canconsist of an integrated circuit with a power source or they can beassembled as a combination of components.

Terms such as “first”, “second”, “top”, “bottom”, “side”, “distal”,“proximal”, and “within” are used merely to distinguish one component(or part of a component or state of a component) from another. Suchterms are not meant to denote a preference or a particular orientation,and are not meant to limit the embodiments described herein. In theexample embodiments described herein, numerous specific details are setforth in order to provide a more thorough understanding of theinvention. However, it will be apparent to one of ordinary skill in theart that the invention may be practiced without these specific details.In other instances, well-known features have not been described indetail to avoid unnecessarily complicating the description.

The terms “a,” “an,” and “the” are intended to include pluralalternatives, e.g., at least one. The terms “including”, “with”, and“having”, as used herein, are defined as comprising (i.e., openlanguage), unless specified otherwise.

Although embodiments described herein are made with reference to exampleembodiments, it should be appreciated by those skilled in the art thatvarious modifications are well within the scope of this disclosure.Those skilled in the art will appreciate that the example embodimentsdescribed herein are not limited to any specifically discussedapplication and that the embodiments described herein are illustrativeand not restrictive. From the description of the example embodiments,equivalents of the elements shown therein will suggest themselves tothose skilled in the art, and ways of constructing other embodimentsusing the present disclosure will suggest themselves to practitioners ofthe art. Therefore, the scope of the example embodiments is not limitedherein.

What is claimed is:
 1. A computing system comprising: a display; atransceiver; a memory, the memory comprising computer-readableinstructions; and one or more processors configured to execute thecomputer-readable instructions to: transmit, by the transceiver, aninitial registration signal to a tool, the tool comprising a radiofrequency tag; receive, by the transceiver, a registration responsesignal from the radio frequency tag of the tool, the registrationresponse signal comprising a tool identifier; store, by a trackingmanager, the tool identifier in a registered tools file; display, by thetracking manager, the tool identifier on the display; transmit, by thetransceiver, an interrogation signal to the radio frequency tag of thetool after a predetermined time interval; and evaluate, by the trackingmanager, a type of a status response signal from the radio frequency tagof the tool, wherein, if the tracking manager determines based on thetype of the status response signal that the tool is beyond a perimeterdistance from the computing system, the tracking manager provides analert via the computing system.
 2. The computing system of claim 1,wherein the computing system is a smart phone and the transceiver is aradio frequency transceiver that attaches to the smart phone.
 3. Thecomputing system of claim 1, wherein the tool identifier comprises atleast one of a tool name and a tool serial number.
 4. The computingsystem of claim 1, wherein the alert comprises at least one of: anaudible alert emitted from the computing system, and a visible alertdisplayed on the display of the computing system.
 5. The computingsystem of claim 1, wherein the one or more processors are furtherconfigured to execute the computer-readable instructions to: determine,by the tracking manager, that the type of the status response signal isan absence of a response from the radio frequency tag of the tool; andprovide, by the tracking manager, the alert from the computing system.6. The computing system of claim 1, wherein the one or more processorsare further configured to execute the computer-readable instructions to:determine, by the tracking manager, that a strength of the statusresponse signal from the radio frequency tag of the tool fails to meet athreshold signal strength; in response to determining the strength ofthe status response signal from the radio frequency tag of the toolfails to meet the threshold signal strength, determine, by the trackingmanager, that the tool is beyond the perimeter distance from thecomputing system; and provide, by the tracking manager, the alert fromthe computing system.
 7. The computing system of claim 1, wherein theone or more processors are further configured to execute thecomputer-readable instructions to: determine, by the tracking manager,that a strength of the status response signal from the radio frequencytag of the tool meets a threshold signal strength; in response todetermining the strength of the status response signal from the radiofrequency tag of the tool meets the threshold signal strength,determine, by the tracking manager, that the tool is within theperimeter distance from the computing system; and provide, by thetracking manager, a notification via the computing system indicating thetool is secured.
 8. A non-transitory computer-readable medium havinginstructions stored thereon that, when executed by one or moreprocessors of a computer, cause the computer to perform operationscomprising: transmitting, by a transceiver, an initial registrationsignal to a tool, the tool comprising a radio frequency tag; receiving,by the transceiver, a registration response signal from the radiofrequency tag of the tool, the registration response signal comprising atool identifier; storing, by a tracking manager, the tool identifier ina registered tools file; displaying, by the tracking manager, the toolidentifier on a display; transmitting, by the transceiver, aninterrogation signal to the radio frequency tag of the tool at apredetermined time interval; and evaluating, by the tracking manager, atype of a status response signal from the radio frequency tag of thetool, wherein, if the tracking manager determines based on the type ofthe status response signal that the tool is beyond a perimeter distancefrom the computing system, the tracking manager provides an alert viathe computer.
 9. The non-transitory computer-readable medium of claim 8,wherein the computer is a smart phone and the transceiver is a radiofrequency transceiver that attaches to the smart phone.
 10. Thenon-transitory computer-readable medium of claim 8, wherein the toolidentifier comprises at least one of a tool name and a tool serialnumber.
 11. The non-transitory computer-readable medium of claim 8,wherein the alert comprises at least one of: an audible alert emittedfrom the computing system, and a visible alert displayed on the displayof the computing system.
 12. The non-transitory computer-readable mediumof claim 8, wherein the computer-readable medium further comprisesinstructions that cause the computer to perform operations comprising:determining, by the tracking manager, that the type of the statusresponse signal is an absence of a response from the radio frequency tagof the tool; and providing, by the tracking manager, the alert from thecomputing system.
 13. The non-transitory computer-readable medium ofclaim 8, wherein the computer-readable medium further comprisesinstructions that cause the computer to perform operations comprising:determining, by the tracking manager, that a strength of the statusresponse signal from the radio frequency tag of the tool fails to meet athreshold signal strength; in response to determining the strength ofthe status response signal from the radio frequency tag of the toolfails to meet the threshold signal strength, determining, by thetracking manager, that the tool is beyond the perimeter distance fromthe computing system; and providing, by the tracking manager, the alertfrom the computing system.
 14. The non-transitory computer-readablemedium of claim 8, wherein the computer-readable medium furthercomprises instructions that cause the computer to perform operationscomprising: determining, by the tracking manager, that a strength of thestatus response signal from the radio frequency tag of the tool isdiminishing over time; in response to determining the strength of thestatus response signal from the radio frequency tag of the tool isdiminishing over time, determining, by the tracking manager, that thetool is beyond the perimeter distance from the computing system; andproviding, by the tracking manager, the alert from the computing system.15. The non-transitory computer-readable medium of claim 8, wherein thecomputer-readable medium further comprises instructions that cause thecomputer to perform operations comprising: determining, by the trackingmanager, that a strength of the status response signal from the radiofrequency tag of the tool meets a threshold signal strength; in responseto determining the strength of the status response signal from the radiofrequency tag of the tool meets the threshold signal strength,determining, by the tracking manager, that the tool is within theperimeter distance from the computing system; and providing, by thetracking manager, a notification via the computing system indicating thetool is secured.
 16. A computing system comprising: a display; atransceiver; a memory, the memory comprising computer-readableinstructions; and one or more processors configured to execute thecomputer-readable instructions to: receive an initial login for aworker; transmit, by the transceiver, an initial registration signal toa tool, the tool comprising a radio frequency tag; receive, by thetransceiver, a registration response signal from the radio frequency tagof the tool, the registration response signal comprising a toolidentifier; store, by the tracking manager, the tool identifier in aregistered tools file; display, by the tracking manager, the toolidentifier on the display; receive a subsequent login for the worker;transmit, by the transceiver, an interrogation signal to the radiofrequency tag of the tool, receive, by the transceiver, a responsecheck-in signal from the radio frequency tag of the tool, the responsesignal comprising a check-in tool identifier; store, by the trackingmanager, the check-in tool identifier in the registered tools file; andprovide, by the tracking manager via the computing system, an alert ifthe tool identifier in the registered tools file does not have amatching check-in tool identifier.
 17. The computing system of claim 16,wherein the computing system is located in a vehicle.
 18. The computingsystem of claim 16, wherein the tool identifier comprises a at least oneof a tool name and a tool serial number.
 19. The computing system ofclaim 16, wherein the alert comprises at least one of: an audible alertemitted from the computing system, and a visible alert displayed on thedisplay of the computing system.
 20. The computing system of claim 16,wherein the one or more processors are further configured to execute thecomputer-readable instructions to: provide, by the tracking manager viathe computing system, a cleared notification if the tool identifier inthe registered tools file matches the check-in tool identifier.