N.Rich Data Security Approach