Patent attributes
The disclosed computer-implemented method for detecting cloning of security tokens may include (i) logging, at an authentic security token, one-time-use security codes that are derived at the authentic security token from a shared secret that is stored at the authentic security token, (ii) logging, at a validation server, one-time-use security codes that are derived from the shared secret and received at the validation server, (iii) determining that the authentic security token has been cloned by determining that the one-time-use security codes logged at the validation server include at least one additional one-time-use security code that is not included in the one-time-use security codes logged at the authentic security token, and (iv) performing a security action in response to determining that the authentic security token has been cloned. Various other methods, systems, and computer-readable media are also disclosed.