You could do this by including the SecurityStamp (or some hash of it) in the token. You could then create your own OnReceive handler that verified the SecurityStamp for that user against the database.
The downside to this is you have a database hit for EVERY request, so it removes one of the key benefits of having a bearer token in the first place.
In effect, you would be combining the responsibilities of a bearer token and refresh token into one token.
Using refresh tokens instead, which are submitted much less frequently, will be far more performant, it won't really entail any more coding and it's a fairly widely recognised security flow model.