Solutionunvalidated
Your hardware token idea is the only thing you've listed that is plausible — assuming the token's hardware has its own clock and is hardened against tampering. Tension: There is no way to trust hardware that someone else controls. Outcome: This is just a computer that you trust because the user does not control it.
1437e41a-11eb-4ed1-bab8-463c1ce2cc2e
Your hardware token idea is the only thing you've listed that is plausible — assuming the token's hardware has its own clock and is hardened against tampering. Tension: There is no way to trust hardware that someone else controls. Outcome: This is just a computer that you trust because the user does not control it.