US 12,225,057 B2
Resolving access policies between intent-based network architectures and cloud native architectures
Thomas Szigeti, Vancouver (CA); David John Zacks, Vancouver (CA); Walter Hulick, Pearland, TX (US); and Shannon McFarland, Parker, CO (US)
Assigned to Cisco Technology, Inc., San Jose, CA (US)
Filed by Cisco Technology, Inc., San Jose, CA (US)
Filed on Sep. 8, 2023, as Appl. No. 18/244,048.
Application 18/244,048 is a continuation of application No. 17/473,306, filed on Sep. 13, 2021, granted, now 11,792,230.
Prior Publication US 2023/0421610 A1, Dec. 28, 2023
This patent is subject to a terminal disclaimer.
Int. Cl. G06F 21/62 (2013.01); G06F 21/71 (2013.01); H04L 9/40 (2022.01); G06F 21/78 (2013.01)
CPC H04L 63/20 (2013.01) [H04L 63/0876 (2013.01); H04L 63/101 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A system comprising:
one or more processors; and
one or more non-transitory computer-readable media storing instructions that, when executed by the one or more processors, cause the one or more processors to perform operations comprising:
receiving, at a containerized-application network, a first set of access policies that define whether first applications are allowed or restricted from communicating in the containerized-application network with second applications;
receiving, at the containerized-application network and from a network architecture, a second set of access policies that define whether the first applications are allowed or restricted from communicating in the network architecture with the second applications;
identifying a conflict between the first set of access policies and the second set of access policies;
obtaining data indicating a resolution for the conflict between the first set of access policies and the second set of access policies;
determining, based at least in part on the resolution, a third set of access policies that defines whether the first applications are allowed or restricted from communicating with the second applications in the containerized-application network and the network architecture; and
applying the third set of access policies to communications in the containerized-application network.