Aimed at the complexity of the cryptology algorithm, this article discuss the management using the public key cryptology and the private key cryptology distribution, use the private key cryptology encrypt and decrypt the information which to be delivered.