It depends on which bank it is. The analysis is as follows:
1. If the bank card password is entered incorrectly and exceeds the limit, the bank card will be locked. You need to bring your ID card to the relevant bank counter to handle the unlocking procedure.
2. Due to differences in banks, some banks can unlock it themselves after 24 hours.
Extended information:
1. Chip debit card: traditional magnetic stripe debit card. After the cardholder enters the password, the system uses PIN Block to transmit it to the card-issuing bank host for processing. Verification; for chip debit cards, the transaction verification code generated by the chip card itself is used as the basis for verification by the issuing bank. Therefore, if the magnetic stripe card is skimmed and the password is leaked, the card can easily be copied in a short period of time, and the cardholder's deposits may be stolen and the card credit may be misappropriated.
2. The chip debit card has CPU, memory and I/O, and almost has the most basic functions of a computer. Therefore, the chip debit card itself can safely store the logical operations and base code of the issuing bank. The verification code generated by the card is known only to the card-issuing bank. In other words, when using a chip card for transactions, the cardholder's password does not need to be sent to the card-issuing bank for verification. Instead, the chip financial card directly verifies the correctness of the password, and only after passing the verification does a transaction verification code be generated for verification.
3. Chip credit card: For traditional magnetic stripe credit cards, the data on the second track is read by the card swipe machine and then sent to the card issuer through the communication network. The card issuer verifies the authenticity of the magnetic stripe card through CVV. Issue an authorization code. Chip credit cards come with their own 3DES Key program, which can use the EMV parameters stored inside to generate ARQC (Authorisation Request Cryptogram) for verification.
4. Counterfeit cards copied due to the leakage of the second track information cannot copy the key inside the chip card, so they cannot generate ARQC and send it to the card issuer for authorization, which reduces the card issuer's risk of counterfeit cards.
Baidu Encyclopedia-Bank Card Password Verification Technology