End-to-end data security encryption method and device, electronic equipment and storage medium

Fuente: WIPO "circular economy"
The invention provides an end-to-end data security encryption method and device, electronic equipment and a storage medium. The method comprises the steps that key negotiation is initiated between a first terminal and a second terminal which are in communication, and the first terminal generates and sends an encrypted first random number to the second terminal; the first random number is received and processed by using a second terminal, and the second terminal decrypts the first random number, generates and encrypts a second random number, and sends the encrypted second random number to the first terminal; the first terminal receives and processes the second random number, the first terminal decrypts the second random number, and the first terminal and the second terminal generate session keys based on the first random number and the second random number respectively; and carrying out validity verification on the session key, confirming that the first terminal and the second terminal successfully negotiate the session key, and establishing a secure communication channel. According to the invention, the information security and function security of end-to-end data encryption and transmission are improved, the system consistency is improved, and the energy consumption and deployment cost are reduced.