Check out the Phoenix Technologies announcement on their BIOS hardware authentication scheme.
People like Bruce Schneier lecture us all on how hard it is to create a trusted network verification model that holds up under a variety of conditions and needs. And who needs this (very few)?