Representing personal information and confidential data in a way that allows a data center to authenticate a customer submitting his or her credentials, without having the exact copy of the credentials held by the customer. If the data center is compromised and the customer authentication data is exposed, the data center arms itself with another non-exact copy of the customer authentication data such that only the customer holding the un-compromised data will properly authenticate themselves. A thief, holding the now defunct data center version of the customer authentication data, will not be able to use the stolen customer authentication data to authenticate themselves as the customer.