This document summarizes a paper on implementing protection rings in hardware computer architecture. It introduces protection rings as a mechanism to associate multiple access levels or domains with a running process. Protection rings allow a process to change its active domain by moving to a lower numbered ring through controlled "gates." The document outlines the motivation, criteria for evaluation, definition of rings and privileges, mechanisms for moving between rings including calls and returns, and how protection rings were implemented in the Multics operating system.