- What's New
- Service Overview
- Billing
- Getting Started
-
User Guide
- Buying a Cloud Phone Server
- Accessing the Cloud Phone
- Cloud Phone Management
- Cloud Phone Server Management
-
Using AOSP
- Overview
- Automatic Application Authorization
- Loading Pictures
- Rooting
- Startup Script
- Automatic Installation of Applications
- Hiding Virtual Keys
- Hiding the Status Bar
- Disabling the Notification System
- Disabling Screenshot Protection
- Simulating Location Information
- App Installation Whitelist
- App Installation Blacklist
- Forcibly Installing a 32-Bit Application
- Dynamically Changing the System Language
- Background Process Management
- Texture Compression
- Restarting a Cloud Phone
- Device Emulation
- Cloud Phone Audio and Video
- Configuring a Route
- Permission Management
- Adjusting Resource Quotas
- Monitoring
- CTS
- Appendix
-
Best Practices
- Best Practices of Connecting to General-Purpose Cloud Phones
-
Best Practices of Cloud Phone Application Sharing
- Overview of Application Sharing
-
Usage Guide to Application Sharing
- Purchasing a Cloud Phone Server That Supports Application Sharing
- Preparing the TAR Package of an Application
- Pushing the TAR Package of an Application to a Cloud Phone Server
- Using the appctrl Command to Manage Shared Applications
- Deleting an Application
- Presetting Configuration Files by Sharing Applications
- appctrl Commands
- Installing an Application on Cloud Phones in Batches
- Modifying the Cloud Phone GPS Location
- Using the Cloud Phone Camera
- Using STF to Manage Cloud Phones in Batches
- Allowing a Cloud Phone Server to Access a Public Network Outside the Chinese Mainland
- Delegating CPH to Operate OBS Buckets
- Changing the AOSP Version of a Cloud Phone
- Change History
-
API Reference
- Before You Start
- API Overview
- Calling APIs
- Getting Started
-
Cloud Phone Server APIs
-
Cloud Phone Servers
- Querying cloud phone servers
- Querying the Details of a Cloud Phone Server
- Querying Flavors of Cloud Phone Servers
- Purchasing a Cloud Phone Server
- Restarting Cloud Phone Servers
- Changing the Cloud Phone Server for a Cloud Phone
- Pushing Shared Storage Files
- Querying Shared Storage Files
- Deleting Shared Storage Files
- Pushing Shared Applications
- Deleting a Shared Application
- Changing the Flavor of a Cloud Phone Server
- Modifying the Name of a Cloud Phone Server
- Bandwidth
-
Cloud Phones
- Querying Cloud Phones
- Querying Cloud Phone Details
- Obtaining the Cloud Phone Access Information
- Querying Cloud Phone Flavors
- Querying the Image of a Cloud Phone
- Resetting Cloud Phones
- Restarting Cloud Phones
- Stopping Cloud Phones
- Editing the Name of a Cloud Phone
- Updating Properties of Cloud Phones
- Exporting Data from Cloud Phones
- Restoring Data of Cloud Phones
- Diverting Cloud Phone Traffic
- Expanding the Data Disk of a Cloud Phone
- Tasks
- Keys
- Encoding Services
- ADB Commands
- Tags
- Images
-
Cloud Phone Servers
- Permissions Policies and Supported Actions
- Common Parameters
- Appendix
-
FAQs
-
Consulting
- What Are the Advantages of Huawei Cloud Phone Compared with Other Similar Solutions?
- Does Cloud Phone Support iOS?
- Are There Cloud Phone Root Permissions?
- Does Each Cloud Phone Has an Independent Public IP Address?
- How Is CPH Billed?
- How Do I Obtain the Project ID?
- How Do I Install Applications on a Cloud Phone?
- How Long Does It Take to Activate a Server After I Purchase It?
- What Should I Do If I Can't Find My Cloud Phone Server on the CPH Console?
- How Long Will Resources Be Released After My Cloud Phone Server Expires?
- What Can I Do If the Private Key File Is Lost?
- How Can I Know Whether the SSH Service Has Been Installed on My Local Device?
- What Are Common ADB Commands?
- Does the Cloud Phone Support Cameras?
- Does the Cloud Phone Support Facial Recognition?
- What Are the Security Group Authorization Rules for Cloud Phones Using Custom Networks?
-
SSH Tunnel Faults
- What Can I Do If the SSH Tunnel Fails to Be Established When I Access the Cloud Phone over the Public Network?
- What Does Message "Authorized users only. All activities may be monitored and reported." Indicate?
- What Can I Do If Message "too open" Is Displayed When I Am Establishing the SSH Tunnel?
- What Can I Do If Message "Permission denied" Is Displayed When I Am Establishing the SSH Tunnel?
- What Can I Do If Message "no match mac found" Is Displayed When I Am Establishing the SSH Tunnel?
- What Can I Do If Message "no matching key exchange method found" Is Displayed When I Am Establishing the SSH Tunnel?
- How Do I Keep an SSH Session Uninterrupted?
- What Can I Do If I Failed to Establish an SSH Tunnel?
- What Can I Do If an Error Occurs When I Invoke the Cloud Phone Query API?
- ADB Connection Faults
-
Consulting
- General Reference
Copied.
Scenarios
Cloud Gaming
Cloud gaming is a popular trend of the game industry. It provides players with a download-free game service that is independent of mobile phone performance. The video streaming modes it uses include PC game streaming and mobile game streaming. As a cloud-based emulation phone, a cloud phone server can take the advantage of instruction isomorphism of mobile games and carry game applications on the cloud.

Architecture description:
- Mobile game applications are installed on cloud phones. After being streaming processed and encoded, the audio and video images on the cloud phones are sent to clients for display. The cloud phones receive operation instructions from the client to control games on the cloud phones.
- The login server cluster uses Elastic Load Balance (ELB) and Auto Scaling (AS) to handle ultra-large concurrent data requests.
- Cloud phones can be deployed on central and edge nodes to effectively reduce the user interaction latency and achieve optimal experience and best bandwidth cost-effectiveness.
Mobile Office
With the popularization of mobile apps, more and more enterprises are starting to allow work from mobile terminals. However, they are faced with the challenge of data security. Although purchasing customized secure mobile phones can enhance security, leakage of sensitive data cannot be prevented. As an alternative solution, cloud phones store core enterprise data on the cloud and control access to mobile phone screens only within authorized employees.

Architecture description:
- After enterprise applications are uploaded to Object Storage Service (OBS), they are installed on cloud phones in batches. Audio and video images on cloud phones are streamed and encoded and then sent to clients for display. In addition, the cloud phones receive operation instructions from clients to control the applications on cloud phones. Enterprise data is stored on the cloud, which is more secure and reliable.
- The server cluster for login or customer service uses ELB and AS to handle ultra-large-scale concurrent data requests.
- Cloud phones can be deployed on central and edge nodes to effectively reduce the user interaction latency and achieve optimal experience and best bandwidth cost-effectiveness.
Application Simulation Testing
Generally, mobile phones provide services for individuals. As the type and number of mobile applications increase, enterprises may need to run a large number of mobile applications on mobile phones in specific scenarios to implement automation or intelligence functions. To run these applications, a large number of simulation mobile phones are needed.

Architecture description:
- Mobile applications are installed on cloud phones. Enterprise orchestrated scripts control cloud phones to run one or more apps. Personalized script operations are able to handle various scenarios.
- An enterprise can build its own cloud phone management and O&M platform, marketing system, or automation script platform on an ECS and use two independent VPCs to control the platforms separately.
- Cloud phone applications can be centrally stored in OBS buckets, reducing network bandwidth consumed by installing or updating these applications.
- A wide range of security and monitoring services ensure that applications are not interrupted by online threats.
Streaming Interaction
Streaming interaction is another CPH scenario. It allows the host to stream the mobile phone screen to audiences and interact with them to bring an enjoyable interaction experience.

Architecture description:
- Mobile phone applications and game applications are installed on cloud phones. These applications output one or combine more mobile phone screens to the encoding server for integrated encoding. Then, the screens are copied and pushed to different clients (such as PCs, mobile phones, and tablets) for display. Cloud phones receive operation instructions from one or more clients.
- The login server cluster uses ELB and AS to handle ultra-large concurrent data requests.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot