Voice processing and computer telephony integrated (CTI) has important applications in education. An overview of ideas to help design and build new computer telephony and voice-processing application for automated login and pin generation for student registration is discussed in this research. This techniques allows students to register in to school without waiting in long queues. Students come to an authorized administrator and identify themselves by presenting their admission letter, the system automatically checks if this student is worth of generating login pin for or not.

The system can also handle the different drop and add changes in students’ registration pin generation. Such system has a lot of advantages and benefits. First, it is always there for everyone; day and night, the system can be set up to dynamically manage the use of telephone line as all the data input to it is fed directly to the computer and as well as all data inputted can be fully automated, confidential and secure, as the data is fed straight into the computer; it is always safer from prying eyes. 

Login and pin generation is now considered as information security as applied to computers. The objective of pin generation includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible and productive to its intended users. The technologies of login and pin generation are based on logic. As security is not necessarily the primary goal of most computer applications, designing a program with security in mind often imposes restrictions on that program's behavior. However, secured programs must be able to provide some level of security mechanism to computer users.

Login and pin generation are often considered confidential systems because their use is typically restricted to a limited number of users. This confidentiality can be compromised in a variety of ways. For example, card number and card serial number data can be harmed by people who spread data for personal interest.

A variety of simple techniques can help prevent login and pin generation  crimes, such as protecting screens from observation, keeping printed information and computers in locked facilities, backing up copies of data files and software, and clearing desktops of sensitive information and materials. Increasingly, however, more sophisticated methods are needed to prevent pin generation crimes. These include using encryption techniques, establishing software usage permissions, mandating passwords, intrusion detection systems. In addition, controls within application systems and disaster recovery plans are also necessary.


With the advances in the generation of pin for registration in information and communication technology (ICT), computer users must brace up to providing alternatives to the way login and pin generation for registration of students. Deficiencies or lapses in operating systems provide hackers the means to break into the manipulation of registration pin, hence the need to work out an effective pin generation software solution for use on personal computer systems to login and generate pin for registration of students from the computer system, as well as the generation of Login pin manually is very difficult to manipulate large sum of numbers without having clashing.




The primary objectives of the research project are to design and implement computer program, which would assist Student Login and Pin Generation for student registration system processes.

          The objective for embarking on this research project is to find solution to the problems facing the Login and Pin Generation System for Students registration system processes: -

i.        To design and implement a login and pin generation for student registration software for personal computer

ii.       To provide for multi-user login system on the computer system to generate pin for student registration.

iii.      To provide allocation of time frame for login and pin generation system for student registration.

iv.      To allow generation of login reports by an administrative user on a computer system which student can used for their registration in their school.