Starting from the point of view of information security, this paper researches the security mode in the Blutooth information transmission. An analyses of the Key Management of Bluetooth Technique was also given and the author's viewpoints are put forward as well.