. . "If a portable device such as a laptop or notebook computer were trainable to biometrically recognize its owner and to operate only after biometrically confirming the user's identity, a stolen laptop or notebook computer would be worthless." . . .