While very useful where a high degree of security is required the expense, complexity, and need for such systems to access a database of characteristics of persons to be recognized, and the need to secure and continually update this database has limited such systems to applications such as controlling access to extremely sensitive areas.