Some HP iPaq's already have this on them. Fujitsu has them standard on some models (completely integrated.) The biggest problem with these is it is very easy to fool them (for anyone who intends to.) There was a great report on how to do it when they first came out (google for cracking biometric fingerprint scanning.) The established method for using fingerprint scanning (effectively) would be a three step process (plus one hardware requirement above and beyond):
1) Smart card with algorithmic key
This provides a physical key that must be present and since the "key" on the card is changing, it has to sync with the laptop on a challenge/response system. The would be a card that would be kept with the user at all times. You normally have to slide these in before the system will even turn on.
2) Biometric scan (fingerprint, retinal, voice)
This is the second level after Smart Card verification. Verses typing in the password, you'd have to undergo one of the biometric scans. Fingerprint and voice are easily fakeable, retinal is obviously much harder (not to get morbid, but even if you were killed and the eye removed, there is only a certain amount of time before the retina and cornea clouds over)
3) A secure password known only by the user and that undergoes a password-cracker before being allowed.
This would be a password that is supplied by the user over 8 characters and the system would run it against common algorithms to check if it is easily breakable (ie, common dictionary words, match to any of the internal profile stats of the user like birthdate, ssn#) and have to include both letters and numbers and be case-sensitive. Also, the username would have to be typed in and not displayed (having it displayed just kills 50% of effort necessary to break into a system)
4) Embedded (below BIOS level) encrypted security area to store password keys. (such as IBM's ESS chip)
This keeps the passwords used above (including the reference Biometric scans) separate from the general system and stores even the microcode passwords for the harddrives (which encrypts and secures them) It is not accessible directly (even from a BIOS menu) since it is more or less a flash rom space that holds encryption algorithms to only store the keys. It can also be used to store Internet passwords. That way even if the hard drive is cracked, the passwords are unavailable.
Using all of the above, you'll have a near impossible to crack laptop. However, if you forget any of the above, you run the risk of having your system made permanently unusable. For the passwords, you have to set how many attempts are allowed before total lockout (usually no more than 3 times) This defeats even brute force cracking.
I'm not aware of how many of the above OS X and Macintosh hardware supports (there is UNIX support for all of them and hardware support from IBM (ESS chip) and Cray: both used in certain DoD applications, CIA systems, and certain ThinkTanks used by the CIA and DoD.) I used to have Los Alamos access for certain projects and had to undergo these levels of security to access certain info. The hardest was definitely the user provided password because it had to be changed every 2 weeks and you couldn't write it down (I know you're thinking "duh!" but when you have to pickout passwords that have no connection to you every 2 weeks it's hell on earth trying to recall them)